Security Management & Auditing
Course Description :

Performing IT security audits at the enterprise level can be a daunting task. How should you determine which systems to audit first? How do you assess the risk to the organization related to information systems and business processes? What settings should you check on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings? How do you turn this into a continuous monitoring process? The material covered in this course will answer all of these questions and more.

Department :Computer Science
Program :Bachelor Of Cyber Security
Course Level :Bachelor
Course Outline :
 

King Abdullah II School of Information Technology
Department of Computer Science

Testimonials

  • Saying goodbye to my wonderful faculty is more nostalgic than simple words can describe; it has truly become a second home. ... Eman Ennab

  • King Abdullah II College for Information Technology was and still maintains the pertinent atmosphere for volunteering in many sci ... Yousef Arabiat

  • Despite having differences between the study experiences and real work experience, the university is the pillar for building care ... Abed Abuhijleh