• Online, Self-Paced
Course Description

This course presents students the opportunity to explore the intricacies of Information Security Audit processes and practices. Beginning with the fundamentals and progressing through advanced techniques, students will learn to differentiate between acceptable and non-acceptable artifacts when used as evidence. Students will also be presented with the audit ecosystem from both the internal and external perspectives. In addition, students will explore privacy laws in the United States and their impact on the protection of individual and organizational privacy, and the requirements of compliance with these laws.

Learning Objectives

This course is an elective in the Cyber Security concentration for the Masters degree in Security Management

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas