Upon successful completion of this course, students will be able to:
– Implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices
– Evaluate an organization’s structure, policies, accountability mechanisms, and monitoring practices
– Assess information systems acquisition, development, and implementation
– Evaluate the information systems operations, maintenance, and support of an organization
– Assess the business continuity and disaster recovery processes to ensure the maintenance of IT services during disruptions
– Define protection policies to uphold the confidentiality, integrity, and availability of information assets
Curriculum
- 1 Section
- 1 Lesson
- Lifetime
Expand all sectionsCollapse all sections
Requirements
- There are no prerequisites for this course.
Target audiences
- This course is intended for information systems security professionals, internal review auditors, and individuals interested in information systems audit, controls, and security.