New ISACA Teaching Materials Help Professors Structure Courses on COBIT for Information Security

 Rolling Meadows, Illinois, USA (1 August 2013)—ISACA, a nonprofit association of more than 110,000 IT security, assurance and governance professionals in 180 countries, has released new materials for academic professionals to use free of charge as an integral part of their information security curriculum. Caselets (brief case studies), a student book and supporting teaching notes are now available and incorporate guidance from COBIT 5 for Information Security.

Professors and teachers can use the set of educational materials to explain and present principles of COBIT 5 for Information Security in their curricula and courses on information systems management, information security management and information systems auditing. COBIT 5 is a business framework for the governance and management of enterprise information and technology. It provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in and value from their enterprise's information and technology assets.

The new classroom materials, developed by international academic professionals and practitioners, include:

�         Information Security Using COBIT 5 for Information Security: Caselets

�         Information Security Using COBIT 5 for Information Security: Caselets—Teaching Notes

�         Information Security Student Book: Using COBIT 5 for Information Security

"The ISACA model curriculum and student book reflect the  latest needs of the industry as they are being updated each year by professionals and academicians who serve as volunteers," said Kameswara Rao Namuduri, Ph.D., CISA, CISM, CISSP, University of North Texas, USA, chair of ISACA's Academic Program Subcommittee. "Students benefit immensely by learning from these classroom materials, giving them a chance to prepare well before they take their first job in the industry."

The caselets on information security governance, risk management, program development and management, and incident response are designed for graduate and senior undergraduate classes. The caselets will help students:

�         Learn how to apply principles from COBIT 5 for Information Security

�         Derive a set of approaches and solutions that fulfill information security governance objectives

The student book is to be used for students with little or no business experience. The book will help students:

�         Understand and learn principles of COBIT 5 for Information Security

�         Learn techniques to protect information

Academic professionals can obtain the full documents free of charge in the academic area of ISACA's Knowledge Center, at www.isaca.org/Knowledge-Center/Academia.

Additional academic resources provided by ISACA include the ISACA Academic Advocate program, ISACA Model Curriculum for IS Audit and Control, 2nd Edition, ISACA Model Curriculum for Information Security Management and the Academic Research page of the ISACA web site.

About ISACA

With more than 110,000 constituents in 180 countries, ISACA® (www.isaca.org) helps business and IT leaders maximize value and manage risk related to information and technology. Founded in 1969, the nonprofit, independent ISACA is an advocate for professionals involved in information security, assurance, risk management and governance. These professionals rely on ISACA as the trusted source for information and technology knowledge, community, standards and certification. The association, which has 200 chapters worldwide, advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control (CRISC) credentials. ISACA also developed and continually updates COBIT®, a business framework that helps enterprises in all industries and geographies govern and manage their information and technology.

Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center

Follow ISACA on Twitter:  https://twitter.com/ISACANews

Join ISACA on LinkedIn: ISACA (Official) http://linkd.in/ISACAOfficial   

Like ISACA on Facebook: www.facebook.com/ISACAHQ

MORE HISTORIC HACKS
Would you like more insight into the history of hacking? Check out Calvin's other articles about historical hackery:
About the Author

GoCertify's mission is to help both students and working professionals get IT certifications. GoCertify was founded in 1998 by Anne Martinez.