Recall and identify key concepts related to IT auditing, cybersecurity, risk management, and internal controls.
Describe the fundamental principles of information systems auditing and risk management, including how to assess internal controls and evaluate cybersecurity practices.
Implement auditing techniques and risk management strategies in real-world scenarios, demonstrating the ability to evaluate and audit information systems for compliance.
Examine the effectiveness of internal controls and cybersecurity practices within an organization and identify potential risks or vulnerabilities.
Assess and determine the appropriate auditing and risk management solutions for various organizational needs, ensuring compliance with industry standards and regulations.
Introduction and Assessment Test
IT Governance and Management
The Audit Process
IT Life Cycle Management
IT Service Management
IT Infrastructure
Business Continuity and Disaster Recovery
Information Security Management
Identity and Access Management
Conducting a Professional Audit
Popular Methodologies, Frameworks, and Guidance
Certification Exam Preparation
96
1
ISACA
https://www.isaca.org/credentialing/cisa
Governance
IT Risk Assessment
Risk Response and Reporting
Information Technology and Security
No
Prior to course enrollment, students should have a basic understanding of Information Technology (IT), including computer systems, networking, and cybersecurity principles. A background in auditing, risk management, or business operations is helpful but not required.
None
None
80% attendance
Actively participate in class, including discussions and independent and group activities.
,Complete assigned labs and projects.
N/A
Individuals who want to expand their knowledge and skills to evidence relevant competencies or those who want to successfully prepare for the relevant industry certification exam(s).
Internal Auditors, Cyber Threat Analysts, Cybersecurity Engineers, Continuous Improvement Engineers
According to Lightcast, there is a need particularly in banking, cybersecurity, technology services, and government sectors due to the ongoing demand for skilled professionals in these areas.
Continuous Improvement Engineers
Cybersecurity Engineers
Cyber Threat Analysts
Internal Auditors
To be notified when this course becomes available, please use
Wake Tech's Notify Me service.
Requisites: None
To view information on this course and additional non-degree course offerings, visit the Workforce Continuing Education Catalog