IS 464 Policy and Audits

This course investigates the policies that govern information security, and how systems can be audited to ensure compliance with those policies. Policies are the process in which technical controls are codified into standards and practices that a company or a governmental organization will use to define controls, and assess compliance of those controls in the working environment. Auditing is the process in which electronic systems are reviewed for compliance with the policies promulgated by senior management. This course focuses on key aspects of information management policies and auditing to ensure compliance with standards based policies and practices. Students will immediately be able to use the information gained in this course to write policies and audit for information systems compliance.

Credits

5

Outcomes

  1. This course will prepare students to:
  2. Understand basic end-to-end communications with security protocols in a hybrid/cloud environment.
  3. Analyze secure communication protocols.
  4. Evaluate information storage security protocols.
  5. Understand basic cryptography, digital forensic concepts, and practices.
  6. Apply data integrity, authentication, and access control protocols.
  7. Create an end-to-end plan demonstrating secure data practices.