The Course Purpose of this course is to create a careful balance of the audit process, governance, and compliance regulations, as well as hands-on introduction to the latest technology tools.
By the end of the course, the students should be able to:
Upon completing this course the students should be able to:
i. Explain the role of IS auditor and the IS audit function
ii. Describe the Course Purpose of controls in an information systems environment
iii. Demonstrate ability to assess the design, placement and quality of controls
iv. Demonstrate ability to analyze some of the basic theory underlying computer security policies models and problems
v. Explain the basic issues in auditing computer security policies and mechanism
Mr. J. Walubengo
Project Cohort 2016
Students should present project proposal as per the specifications
This space is to facilitate Year 4 2016/2017 BSc IT Project supervision. You are expected to regularly log in during this period for further instructions and discussion with the supervisor.
Jotham K. Mwale
The aim of the course is to give students the background they will need to plan, design and manage networks.
At the end of the course students should be able to:
Upon successful completion of this course, the student should be able to:
i. Demonstrate ability to assess the customer requirements and the customer’s existing situation
ii. Demonstrate skills in design a network addressing plan
iii. Describe security criteria for the network
iv. Demonstrate skills in design the Enterprise network in a hierarchical modular fashion
v. Explain the network design and its impact to the customer
How to design User Centered HCI