Python for Auditors
Starting at
3
€
Course length
Location
Language
Scientific Coordination
Executive Coordination
Course Objective
This course focuses on developing Python skills for assembling business data. It will cover some of the same material from Introduction to Accounting Data Analytics and Visualization, but in a more general purpose programming environment (Jupyter Notebook for Python), rather than in Excel and the Visual Basic Editor. These concepts are taught within the context of one or more accounting data domains (e.g., financial statement data from EDGAR, stock data, loan data, point-of-sale data).
The first half of the course picks up where Introduction to Accounting Data Analytics and Visualization left off: using in an integrated development environment to automate data analytic tasks. We discuss how to manage code and share results within Jupyter Notebook, a popular development environment for data analytic software like Python and R. We then review some fundamental programming skills, such as mathematical operators, functions, conditional statements and loops using Python software.
The second half of the course focuses on assembling data for machine learning purposes. We introduce students to Pandas dataframes and Numpy for structuring and manipulating data. We then analyze the data using visualizations and linear regression. Finally, we explain how to use Python for interacting with SQL data.
Target Audience
This course focuses on developing Python skills for assembling business data. It will cover some of the same material from Introduction to Accounting Data Analytics and Visualization, but in a more general purpose programming environment (Jupyter Notebook for Python), rather than in Excel and the Visual Basic Editor. These concepts are taught within the context of one or more accounting data domains.
1st Module
Introduction to
Cybersecurity concepts
(3 hours)
Eng. José Alegria (Altice)
-
Cyber Security definition
-
Importance of security at different layers (from physical to information)
-
Fundamental information security properties: confidentiality, integrity, availability
-
Types of vulnerabilities
-
Types of attacks
-
Motivations of attackers
-
Phases of an attack
-
Attack-Vulnerability-Intrusion (AVI) model
-
NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, Recover
2nd Module
Identification of assets
and risk concepts
(3 hours)
Prof. Ana Respício (FCUL)
-
Resources
-
Information flows and dependencies
-
Security policies and responsibilities
-
Risk identification
-
Risk assessment
-
Risk analysis
-
Risk management
-
Control strategies
-
Cost-benefit analysis in InfoSec
1st Module
Introduction to
Cybersecurity concepts
(3 hours)
Eng. José Alegria (Altice)
-
Cyber Security definition
-
Importance of security at different layers (from physical to information)
-
Fundamental information security properties: confidentiality, integrity, availability
-
Types of vulnerabilities
-
Types of attacks
-
Motivations of attackers
-
Phases of an attack
-
Attack-Vulnerability-Intrusion (AVI) model
-
NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, Recover
2nd Module
Protection of assets and detection of attacks
(3 hours)
Eng. Paulo Moniz (EDP)
-
Access control (Authentication, Authorization, Accounting)
-
Network protection (SSL/TLS, VPNs)
-
Infrastructure protection (Firewalls, IPS, Antivirus)
-
Information protection (backups, DLP tools)
-
Penetration testing
-
Personnel training
-
Intelligence gathering systems/OSINT
-
Vulnerability scanners
-
Event gathering and monitoring systems (Syslog, NIDS, HIDS)
-
Event correlation (SIEMs)
3rd Module
Protection of assets and detection of attacks
(3 hours)
Eng. Paulo Moniz (EDP)
-
Access control (Authentication, Authorization, Accounting)
-
Network protection (SSL/TLS, VPNs)
-
Infrastructure protection (Firewalls, IPS, Antivirus)
-
Information protection (backups, DLP tools)
-
Penetration testing
-
Personnel training
-
Intelligence gathering systems/OSINT
-
Vulnerability scanners
-
Event gathering and monitoring systems (Syslog, NIDS, HIDS)
-
Event correlation (SIEMs)
4th Module
Reaction & Recovery
(3 hours)
Eng. Marcelo Rodrigues (PWC)
-
Response plans (legal frameworks)
-
Incident management (CERT/CSIRT teams)
-
Analysis of incident impacts
-
Contingency plans
-
Disaster recovery
-
Business continuity
-
Image recovery and communication
5th Module
Cybersecurity Law
(3 hours)
Dra. Magda Coco (VdA)
-
The importance of the legal dimension
-
Main legal concepts
-
Cybersecurity legal and regulatory framework – main trends
-
The legal impacts of a cyber incident
-
A strategic approach to cybersecurity regulatory framework (general and sector-specific legislation)