By the end of the course, the students should be able to:

Upon completing this course the students should be able to:

i. Explain the role of IS auditor and the IS audit function

ii. Describe the Course Purpose of controls in an information systems environment

iii. Demonstrate ability to assess the design, placement and quality of controls

iv. Demonstrate ability to analyze some of the basic theory underlying computer security policies models and problems

v. Explain the basic issues in auditing computer security policies and mechanism