This course presents students the opportunity to explore the intricacies of Information Security Audit processes and practices. Beginning with the fundamentals and progressing through advanced techniques, students will learn to differentiate between acceptable and non-acceptable artifacts when used as evidence. Students will also be presented with the audit ecosystem from both the internal and external perspectives. In addition, students will explore privacy laws in the United States and their impact on the protection of individual and organizational privacy, and the requirements of compliance with these laws.
University of Houston-Downtown
University of Houston-Downtown One Main Street
Houston, TX 77002
This course is an elective in the Cyber Security concentration for the Masters degree in Security Management
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.