<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Overview</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">In this course, students will evaluate organizational policies, procedures, and processes to ensure that organizations</span><span style="font-family:&quot;Cambria&quot;,serif"><span style="color:#333333"> information systems align with its overall business goals and objectives.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Who Should Attend</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Objectives</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">Upon successful completion of this course, students will be able to: implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. Evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.&nbsp;&nbsp; Evaluate information systems acquisition, development, and implementation.&nbsp; Evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. Define the protection policies used to promote the confidentiality, integrity, and availability of information assets</span><span style="font-family:&quot;Bookman Old Style&quot;,serif"><span style="color:#333333">.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><span style="font-size:11pt"><strong>Pre-requisites&nbsp; &nbsp;</strong></span></span></p> <p><span style="font-size:11.0pt"><span style="font-family:&quot;Bookman Old Style&quot;,serif">CISA certification requires a minimum of five years of professional information systems auditing, control</span></span><span style="font-size:11.0pt"><span style="font-family:&quot;Bookman Old Style&quot;,serif"><span style="color:#333333"> or security work experience is required for certification.</span></span></span></p>
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit.
Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit.
David blatant have it, standard A bit of how's your father my lady absolutely.
David blatant have it, standard A bit of how's your father my lady absolutely.
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitaes erat consequat auctor eu in elit.