You are here: Home instructional_framework official_framework Business and Information Technology Education Regulatory Compliance and Auditing
Log in

Need a new SSL certificate?

View Career Major Course

Course Information
Business and Information Technology Education
Regulatory Compliance and Auditing
Introduces three typical aspects of information technology (IT) audits: computerized information systems, the computer facility, and the process of developing and implementing information systems. Through readings, case studies, exercises, and discussions, students will learn to plan, conduct, and report on these three types of IT audits. Course topics will include cost/risk tradeoffs, and technical, physical, and administrative methods of providing security and compliance. Current privacy legislation and technical means of providing privacy and IT compliance will also be covered. Students will be able to immediately apply their knowledge to manage the risk of security attacks and implement appropriate compliance policies and strategies. Additional topics may include challenges posed by emerging information technologies, advanced audit software, business continuity planning, and the role of the IT auditor as an advisor to management.
Carrie DeMuth

Robert Hamilton
Enterprise Security Management
Explain information systems security and compliance concepts.

Compare/contrast security management and compliance issues.

Identify and apply technology risk management strategies/policies/issues.

Apply appropriate concepts of security testing and auditing.

Develop detection strategies and response policies.

Apply legal regulations and compliance standards.

Implement appropriate information assurance and compliance management.

Discuss the future of information assurance as it applies to management, policy and legal development, and technology.
(Select from the following options)

ISACA (choose one):
- Certified Information Security Manager (CISM) Exam
- Certified Information Systems Auditor (CISA) Exam

Brainbench (2 tests required):
- HIPAA Security
- Software Quality Assurance


Brainbench -
Information Security Management Handbook; Harold Tipton, CISSP, Micki Krauss, CISSP. ISBN - 0-8493-9561-5

Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management; Thomas R. Peltier. ISBN - 0-8493-7737-3

Implementing Information Security Based on ISO 27001 and ISO 17799: A Management Guide; Van Harden. ISBN - 9-0772-1278-7

Security Metrics: Replacing Fear, Uncertainty, and Doubt. Andres Jaquith ISBN: 0-3213-1998-9
Career Majors That Sequence This Course
Career Cluster Pathway Career Major
Information Technology Network Systems Cyber Security Compliance Specialist
Information Technology Network Systems Network Security Compliance Technician