UNIVERSITY OF DAR ES SALAAM COMPUTING CENTRE

Excellence, Innovation and Technological Foresight
  • Last Update: Apr 17, 2023
user

About This Course

Course Overview

In this course, students will evaluate organizational policies, procedures, and processes to ensure that organizations information systems align with its overall business goals and objectives.

Who Should Attend

The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.

Course Objectives

Upon successful completion of this course, students will be able to: implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. Evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.   Evaluate information systems acquisition, development, and implementation.  Evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. Define the protection policies used to promote the confidentiality, integrity, and availability of information assets.

Pre-requisites   

CISA certification requires a minimum of five years of professional information systems auditing, control or security work experience is required for certification.