JD Edwards ERP Auditing Training (JDE)

Oracle JD Edwards EnterpriseOne is an integrated ERP software suite. JDE is unique in that organizations running their business processes through the software have choice of database and deployment options. JD Edwards has more than 80 ERP application modules, end-user reporting, and robust industry functionality.

Training Logo

In this course you will learn JD Edwards ERP (JDE) and basic technology concepts in ERP. Identify basic control mechanisms that exist in JDE. Recognize JDE-specific GITCs as per the standard Framework and Identify the standard developed tools that analyze JD Edwards Security. We will cover all 3 types of JDE environment- JDE World (AS400 Integrated), JDE One World, JDE Enterprise One (E1).

  • Duration
    25 hours
  • Batches
    Customizable as per your need
  • Suitable for
    professionals, students etc.
  • Course Details
    Download PDF
What you will learn
  • A thorough understanding of knowledge and skills required for an JDE - IS Auditor
  • Insights into the level of knowledge required to meet the complexities of a digital business landscape
  • An in-depth understanding of auditing JDE.
  • Knowledge of management and governance of IT processes and systems
  • Understanding of acquisition, development, test, and implementation of critical business information systems
  • Thorough knowledge of managing, maintaining, and securing information assets
  • Proper understanding of the JDE course material.

Course Agenda


Control -1

  • Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles/roles, critical financial reporting transactions, and segregation of duties (SOD).


Control -2

  • Access for terminated and/or transferred users is removed or modified in a timely manner.


Control -3

  • User access is periodically reviewed.


Control -4

  • SOD is monitored and conflicting access is either removed or mapped to mitigating controls, which are documented and tested.


Control -5

  • Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (such as, password minimum length and complexity, expiration, account lockout).


Control -6

  • Privileged-level access (such as configuration and security administrators) is authorized and appropriately restricted.


Control -7

  • The key attributes of the security configuration are appropriately implemented.


Control -8

  • Application changes are appropriately tested and approved before moving into the production environment.


Control -9

  • Access to implement changes into the application production environment is appropriately restricted and segregated from the development environment.


Control -10

  • Management approves the results of the conversion of data (such as balancing and reconciliation activities) from the old application system or data structure to the new application system or data structure. Management also monitors that the conversion is performed in accordance with established conversion policies and procedures.


Control -11

  • Only authorized users have the access to update the batch jobs (including interface jobs) in the job scheduling software.


Control -12

  • Critical systems, programs, and/or jobs are monitored and processing errors are corrected to ensure successful completion.

Why Choose us?

Over 200 classes are scheduled conveniently every year with small training groups and industry experienced faculties that provides:

  • One-Stop shop for IT Training
  • Companywide IT Training Solutions
  • Interactive Teaching Methodology
  • Job Oriented Training Solutions
  • Flexible modes of training
  • Recorded sessions are available
  • Live Project Experience

In a hurry? Let's chat!

Contact us on Whatsapp
Our Locations