Far too many IT projects fail. The role of the auditor is to identify the symptoms of failure and allow management to address them in a timely manner. This course examines the processes of information systems implementation and operations.
Many IT systems are designed to be secure but are not implemented correctly. This course, Information Systems Auditing: Implementation, will teach you the techniques of auditing the implementation of information systems. First, you will learn how to audit the process of testing and implementation. Then, you will discover how to ensure a secure deployment of the system. Finally, you will understand value of post-implementation review and feedback. By the end of this course, you will have a solid foundation of auditing the implementation of information systems.
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
Course Overview Hello and welcome. My name is Kevin Henry, an information security auditor and educator, author of several certification courses in information security management and audit, here at Pluralsight. This course will provide you with essential information on auditing the implementation of information systems. I look forward to sharing knowledge and experience with you. Auditing plays an important role in providing management with assurance that information systems are implemented in a secure, reliable manner. We need to understand how to conduct an audit of these new or modified information systems, so we'll take a look at implementation and testing, deployment and configuration, and post implementation review. I hope you'll join me on this journey to learn about Information Systems Auditing here, at Pluralsight.