Course No: MSIT.5140-031; SIS Class Nbr: 8866; SIS Term: 2930
Course Status: Open
This course examines the strategies for deploying and auditing secure systems. IT auditors primarily study computer systems and networks form the point of vies of examining the effectiveness of their technical and procedural controls to minimize risks. Risk analysis and the implementation of corresponding best practice control objectives will be studied. The material will include methodologies that help auditors to: Discover what's really going on at a point in time., Find out about potential problems, before it's too late to fix them., Evaluate business situations objectively., Make informed, if difficult decisions., Implement corrective actions, changes and improvements where needed.
*Chat Hours provide an opportunity for the instructor and students to communicate in "real time". It is an informative and interactive session where course related questions, answers, and discussions take place. While student attendance during chat hours is not required, it is highly recommended. Weekly chat sessions are archived for students who are not able to participate in the live chat sessions at the scheduled times.
Every effort has been made to ensure the accuracy of the information presented in this catalog. However, the Division of Graduate, Online & Professional Studies reserves the right to implement new rules and regulations and to make changes of any nature to its program, calendar, procedures, standards, degree requirements, academic schedules (including, without limitations, changes in course content and class schedules), locations, tuition and fees. Whenever possible, appropriate notice of such changes will be given before they become effective.
Additional Registration Information