You will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business goals and objectives.
Upon successful completion of this course, students will be able to: implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
evaluate an organization's structure, policies, accountability, mechanisms, and monitoring practices.
evaluate an organization's systems and infrastructure lifecycle management practices.
perform the post-implementation tasks needed to determine if the changes made were done correctly, meet their objectives, and are being properly maintained.
evaluate the IT service delivery and support of an organization.
define the protection policies used to promote the confidentiality, integrity, and availability of information assets.
evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
The intended audience for this course is information systems security professionals and internal review auditors and other individuals who have an interest in aspects of information systems audit, controls, and security.