Upon course completion, the student will be able to:
1. Compare and contrast IT audit and IT assessment, and explain the role of IT auditors and IT auditing techniques in performing assurance, attestation, and audit engagements.
2. Recognize key regulations and compliance laws concerning information security.
3. Explain the process of selecting security controls, and explain what organizations need to do to achieve and maintain compliance.
4. Compare and contrast the different domain of IT infrastructure.
5. Illustrate the importance of framework and standards in compliance auditing.
6. Identify the key requirements and elements for an audit and evaluate how to define the scope and frequency of an audit.
7. Evaluate methodologies for planning, conducting, and reporting on an audit, and articulate a methodology for testing security controls.
8. Analyze a report of a compliance assessment.
9. Identify common items found in key IT domains and describe methods and best practices of ensuring compliance within each IT domain.