The Systems Security Audit course will provide participants with the skill required to audit information systems within an organization and reveal conformity or nonconformity within the IT infrastructure (Server, Network, Database and Applications).

The Process of Auditing Information Systems
Develop and implement a risk-based IT audit strategy in compliance with IT audit standards

IT Governance and Management of IT
Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives.

Information Systems Acquisition, Development and Implementation
Evaluate the business case for proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives.

Information Systems Operations, Maintenance and Support
Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives.

Protection of Information Assets
Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices.