03-10-2025, 07:09 PM
![[Image: 537368816_que-es-udemy-analisis-opiniones.jpg]](https://img100.pixhost.to/images/404/537368816_que-es-udemy-analisis-opiniones.jpg)
5.02 GB | 26min 17s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
1 CISA Training Introduction.mp4 (53.38 MB)
1 Information System Auditing Overview.mp4 (83.29 MB)
10 Audit Risk.mp4 (12.15 MB)
11 Sampling Methodology.mp4 (67.27 MB)
12 Control Self Assessment.mp4 (40.82 MB)
13 CAATs and Continues Auditing technique.mp4 (72.38 MB)
14 Technology challenges and emerging technologies.mp4 (167.58 MB)
15 CISA Practice Questions - Domain 1 - 1.mp4 (68.36 MB)
16 CISA Practice Questions - Domain 1 - 2.mp4 (47.63 MB)
17 CISA Practice Questions - Domain 1 - 3.mp4 (88.17 MB)
2 Types of Auditing.mp4 (90.04 MB)
3 ISACA's code of professional ethics.mp4 (35.88 MB)
4 ISACA's IT Assurance Framework.mp4 (33.2 MB)
5 Policy, Standard, Procedure, Guideline.mp4 (53.12 MB)
6 Audit Planning.mp4 (94.66 MB)
7 CIA Triad and Understand Security Basic terminologies.mp4 (55.81 MB)
8 Conducting IS Audit.mp4 (113 MB)
9 Audit Reporting.mp4 (48.93 MB)
1 Domain 2 Introduction.mp4 (5.25 MB)
10 Security Controls.mp4 (87.71 MB)
11 Business Case.mp4 (59.89 MB)
12 IT Organization.mp4 (100.81 MB)
13 Portfolio Management and Return on Investment.mp4 (13.02 MB)
14 Outsourcing and Third Party Risk Management - TPRM.mp4 (13.01 MB)
15 IT Performance Management and KPI and Balanced Score Card.mp4 (13.01 MB)
16 IT Balanced Score Card and Business Model for Information Systems.mp4 (40.12 MB)
17 Maturity Assessment Model.mp4 (36.21 MB)
18 Change Management of IT.mp4 (13.01 MB)
19 Quality Control and Assurance.mp4 (5.24 MB)
2 Governance of IT.mp4 (83.6 MB)
20 Impact of Lack of Governance of IT.mp4 (13 MB)
21 Legal and Regulatory Standards.mp4 (121.05 MB)
3 Goals and Objective of Governance.mp4 (86.86 MB)
4 Governance Frameworks.mp4 (98.9 MB)
5 Critical Success Factors for effective Governance.mp4 (13.03 MB)
6 Policies.mp4 (87.84 MB)
7 Standards, Procedures and Guidelines.mp4 (81.63 MB)
8 IT Integration with Business.mp4 (13.01 MB)
9 What is Risk Management.mp4 (131.73 MB)
1 Domain 3 Introduction.mp4 (4.31 MB)
10 Software Engineering Terminologies.mp4 (26.46 MB)
11 IS Auditor roles in Software Projects.mp4 (51.19 MB)
12 Software Testing.mp4 (93.44 MB)
13 Software Implementation and Rollover.mp4 (58.12 MB)
14 Software Accreditation and Post-Implementation Activities.mp4 (50.85 MB)
15 Application Controls.mp4 (59.61 MB)
16 Virtualization.mp4 (63.57 MB)
17 Containers.mp4 (54.81 MB)
2 Business Case and feasibility analysis and RFP Process.mp4 (33.08 MB)
3 Auditor's role in reviewing Business case and feasibility analysis.mp4 (9.55 MB)
4 Project Steps and Project Management Organization.mp4 (42.35 MB)
5 Project vs Program.mp4 (18.29 MB)
6 Software Project Cost Estimation Tools.mp4 (30.87 MB)
7 Project Scheduling and Management Tools.mp4 (40.83 MB)
8 Post Project Activities and IS Auditor role in Project Review.mp4 (20.56 MB)
9 Software Development Methodologies.mp4 (64.79 MB)
1 Domain 4 Introduction.mp4 (9.48 MB)
10 Cloud computing and virtualization overview.mp4 (5.25 MB)
11 Auditing Systems.mp4 (5.24 MB)
12 Application and Network Resiliency.mp4 (5.25 MB)
13 Backup types and media and concerns.mp4 (48.06 MB)
14 Business Continuity Planning and Disaster Recovery Planning.mp4 (70.32 MB)
15 Recovery time and Point Objectives.mp4 (27.35 MB)
16 Recovery Strategies.mp4 (70.3 MB)
17 Data Backup.mp4 (48.1 MB)
6 Incident Management.mp4 (33.81 MB)
7 Database Overview.mp4 (5.25 MB)
8 IT Network Overview.mp4 (5.25 MB)
9 IT Network Overview - Part 2.mp4 (5.24 MB)
1 Information Security vs Cybersecurity.mp4 (78.14 MB)
10 Cyber Security frameworks.mp4 (54.66 MB)
11 Social Engineering.mp4 (104.75 MB)
12 Physical Security Part 1.mp4 (172.89 MB)
13 Physical Security Part 2.mp4 (172.88 MB)
14 AAA Overview.mp4 (5.25 MB)
15 Authentication - a deeper look.mp4 (5.24 MB)
2 Security and Privacy.mp4 (28.91 MB)
25 Application of Encryption.mp4 (59.84 MB)
26 Software Implementation and Rollover.mp4 (54.72 MB)
27 Software Accreditation and Post-Implementation Activities.mp4 (54.67 MB)
28 Application Controls.mp4 (70.36 MB)
3 What we are trying to secure.mp4 (83.83 MB)
4 What is the security vulnerability and how it can be used.mp4 (119.04 MB)
5 Threat Actors.mp4 (53.06 MB)
6 Malware Overview.mp4 (160.89 MB)
7 Cyber Attacks Overview.mp4 (174.79 MB)
8 Web Application Attacks.mp4 (170.82 MB)
9 Ethical Hacking quick overview.mp4 (108.04 MB)]
Screenshot
![[Image: A95lmeiL_o.jpg]](https://images2.imgbox.com/1b/88/A95lmeiL_o.jpg)
1 CISA Training Introduction.mp4 (53.38 MB)
1 Information System Auditing Overview.mp4 (83.29 MB)
10 Audit Risk.mp4 (12.15 MB)
11 Sampling Methodology.mp4 (67.27 MB)
12 Control Self Assessment.mp4 (40.82 MB)
13 CAATs and Continues Auditing technique.mp4 (72.38 MB)
14 Technology challenges and emerging technologies.mp4 (167.58 MB)
15 CISA Practice Questions - Domain 1 - 1.mp4 (68.36 MB)
16 CISA Practice Questions - Domain 1 - 2.mp4 (47.63 MB)
17 CISA Practice Questions - Domain 1 - 3.mp4 (88.17 MB)
2 Types of Auditing.mp4 (90.04 MB)
3 ISACA's code of professional ethics.mp4 (35.88 MB)
4 ISACA's IT Assurance Framework.mp4 (33.2 MB)
5 Policy, Standard, Procedure, Guideline.mp4 (53.12 MB)
6 Audit Planning.mp4 (94.66 MB)
7 CIA Triad and Understand Security Basic terminologies.mp4 (55.81 MB)
8 Conducting IS Audit.mp4 (113 MB)
9 Audit Reporting.mp4 (48.93 MB)
1 Domain 2 Introduction.mp4 (5.25 MB)
10 Security Controls.mp4 (87.71 MB)
11 Business Case.mp4 (59.89 MB)
12 IT Organization.mp4 (100.81 MB)
13 Portfolio Management and Return on Investment.mp4 (13.02 MB)
14 Outsourcing and Third Party Risk Management - TPRM.mp4 (13.01 MB)
15 IT Performance Management and KPI and Balanced Score Card.mp4 (13.01 MB)
16 IT Balanced Score Card and Business Model for Information Systems.mp4 (40.12 MB)
17 Maturity Assessment Model.mp4 (36.21 MB)
18 Change Management of IT.mp4 (13.01 MB)
19 Quality Control and Assurance.mp4 (5.24 MB)
2 Governance of IT.mp4 (83.6 MB)
20 Impact of Lack of Governance of IT.mp4 (13 MB)
21 Legal and Regulatory Standards.mp4 (121.05 MB)
3 Goals and Objective of Governance.mp4 (86.86 MB)
4 Governance Frameworks.mp4 (98.9 MB)
5 Critical Success Factors for effective Governance.mp4 (13.03 MB)
6 Policies.mp4 (87.84 MB)
7 Standards, Procedures and Guidelines.mp4 (81.63 MB)
8 IT Integration with Business.mp4 (13.01 MB)
9 What is Risk Management.mp4 (131.73 MB)
1 Domain 3 Introduction.mp4 (4.31 MB)
10 Software Engineering Terminologies.mp4 (26.46 MB)
11 IS Auditor roles in Software Projects.mp4 (51.19 MB)
12 Software Testing.mp4 (93.44 MB)
13 Software Implementation and Rollover.mp4 (58.12 MB)
14 Software Accreditation and Post-Implementation Activities.mp4 (50.85 MB)
15 Application Controls.mp4 (59.61 MB)
16 Virtualization.mp4 (63.57 MB)
17 Containers.mp4 (54.81 MB)
2 Business Case and feasibility analysis and RFP Process.mp4 (33.08 MB)
3 Auditor's role in reviewing Business case and feasibility analysis.mp4 (9.55 MB)
4 Project Steps and Project Management Organization.mp4 (42.35 MB)
5 Project vs Program.mp4 (18.29 MB)
6 Software Project Cost Estimation Tools.mp4 (30.87 MB)
7 Project Scheduling and Management Tools.mp4 (40.83 MB)
8 Post Project Activities and IS Auditor role in Project Review.mp4 (20.56 MB)
9 Software Development Methodologies.mp4 (64.79 MB)
1 Domain 4 Introduction.mp4 (9.48 MB)
10 Cloud computing and virtualization overview.mp4 (5.25 MB)
11 Auditing Systems.mp4 (5.24 MB)
12 Application and Network Resiliency.mp4 (5.25 MB)
13 Backup types and media and concerns.mp4 (48.06 MB)
14 Business Continuity Planning and Disaster Recovery Planning.mp4 (70.32 MB)
15 Recovery time and Point Objectives.mp4 (27.35 MB)
16 Recovery Strategies.mp4 (70.3 MB)
17 Data Backup.mp4 (48.1 MB)
6 Incident Management.mp4 (33.81 MB)
7 Database Overview.mp4 (5.25 MB)
8 IT Network Overview.mp4 (5.25 MB)
9 IT Network Overview - Part 2.mp4 (5.24 MB)
1 Information Security vs Cybersecurity.mp4 (78.14 MB)
10 Cyber Security frameworks.mp4 (54.66 MB)
11 Social Engineering.mp4 (104.75 MB)
12 Physical Security Part 1.mp4 (172.89 MB)
13 Physical Security Part 2.mp4 (172.88 MB)
14 AAA Overview.mp4 (5.25 MB)
15 Authentication - a deeper look.mp4 (5.24 MB)
2 Security and Privacy.mp4 (28.91 MB)
25 Application of Encryption.mp4 (59.84 MB)
26 Software Implementation and Rollover.mp4 (54.72 MB)
27 Software Accreditation and Post-Implementation Activities.mp4 (54.67 MB)
28 Application Controls.mp4 (70.36 MB)
3 What we are trying to secure.mp4 (83.83 MB)
4 What is the security vulnerability and how it can be used.mp4 (119.04 MB)
5 Threat Actors.mp4 (53.06 MB)
6 Malware Overview.mp4 (160.89 MB)
7 Cyber Attacks Overview.mp4 (174.79 MB)
8 Web Application Attacks.mp4 (170.82 MB)
9 Ethical Hacking quick overview.mp4 (108.04 MB)]
Screenshot
![[Image: A95lmeiL_o.jpg]](https://images2.imgbox.com/1b/88/A95lmeiL_o.jpg)
![[Image: signature.png]](https://softwarez.info/images/avsg/signature.png)