CY 605 Cybersecurity Auditing

This course focuses on the methodology for auditing cybersecurity system controls and exploring the roles and responsibilities of information system auditors.  Topics cover the technology and auditing involved with securing modern computer systems, as well as providing an understanding of risks, control objectives, and standards. This course examines how companies ensure cybersecurity auditors protect their information assets.

Credits

3

Outcomes

  1. This course will prepare students to:
  2. Understand the technical infrastructure and its influence on management and control procedures.
  3. Apply on-prem and cloud-based tools utilized in industry when conducting risk-based plans for information security programs.
  4. Analyze an information security audit plan for application development and its implementation in projects.
  5. Evaluate an information technology audit of a business continuity program plan.
  6. Create an information technology audit plan based on selected industry standards.