
Information Technology (IT) Controls are integral to the protection of our business and personal lives. They are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files. In this course you will learn about policies, procedures and controls that entities should implement to protect corporate assets, company trade secrets, and customer and employee identity and financial information.
This course takes you through a variety of controls you can implement to protect your organization’s assets, brand and image. We delve into understanding the principles behind IT General Computer Controls. Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.
Learning Objectives
- Recognize Information Technology (IT) risks.
- Explore the primary types of IT Controls
- Identify IT Controls that mitigate specific risks
- Explore practices to assist with IT control implementation
81 Reviews (321 ratings)Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.