UNIVERSITY OF DAR ES SALAAM COMPUTING CENTRE

Excellence, Innovation and Technological Foresight
  • user Teacher Elon Gated
  • Last Update: July 24, 2022
  • Review: 4.5
user

About This Course

<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Overview</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">In this course, students will evaluate organizational policies, procedures, and processes to ensure that organizations</span><span style="font-family:"Cambria",serif"><span style="color:#333333"> information systems align with its overall business goals and objectives.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Who Should Attend</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Objectives</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">Upon successful completion of this course, students will be able to: implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. Evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.   Evaluate information systems acquisition, development, and implementation.  Evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. Define the protection policies used to promote the confidentiality, integrity, and availability of information assets</span><span style="font-family:"Bookman Old Style",serif"><span style="color:#333333">.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><span style="font-size:11pt"><strong>Pre-requisites   </strong></span></span></p> <p><span style="font-size:11.0pt"><span style="font-family:"Bookman Old Style",serif">CISA certification requires a minimum of five years of professional information systems auditing, control</span></span><span style="font-size:11.0pt"><span style="font-family:"Bookman Old Style",serif"><span style="color:#333333"> or security work experience is required for certification.</span></span></span></p>

  • Learning Objectives

  • Find a new position involving
    Data modeling.
  • Expanded responsibilities as part of
    an existing role.
  • Ready to begin working on real-world
    data modeling projects.
  • Other Instructors

  • user Eleanor Fant Instructor
  • user Lauren Stamps Teacher
  • user Jonquil Von Associate

Course Curriculum

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit.

  • Week 1
  • 0/4

Beginners level

Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.

2 Videos,1 Audio,1 Reading

  • Video: Greetings and Introductions 2 questions 12 minutes
  • Video: Introducing Elizabeth Gerber 26 minutes
  • Audio: Michael Chapman of IDEO on Interviewing 14 minutes
  • Reading: Slides 19 minutes
  • Week 2
  • 0/6

Diplomatic Language

Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1Videos,1 Audio,2 Reading

  • Reading: Collocations For Job Interview 12 minutes
  • Video: Connecting through Technology 26 minutes
  • Audio: Strategic Leadership 3 questions 8 minutes
  • Reading: Web Coding Basics 6 minutes

Reviews

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit.

5
4 Ratings

Detailed Rating

5 stars

100%

4 stars

30%

3 stars

2 stars

1 stars

2 Comments

Write a Review

Ratings:

Members Info

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitaes erat consequat auctor eu in elit.

Total number of students in course: 24

  • user Douglas Lyphe Instructor
  • 04 Courses
  • 02 Reviews
  • 2.50 Rating
  • user Jason Response Teacher
  • 07 Courses
  • 8 Reviews
  • 3.50 Rating
  • user Eleanor Fant Associate
  • 02 Courses
  • 05 Reviews
  • 4.00 Rating
Chat Support Hello, may I help you?
UCC Logo
UCC
Digital Assistant
×
Chat started
Welcome
Please select one of the following options: