11-19-2024, 09:17 PM
2.65 GB | 00:22:38 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
01 - CISA Overview (30.53 MB)
02 - The Process of Auditing Information Systems (44.85 MB)
03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (40.26 MB)
04 - Audit Risk Assessment (64.84 MB)
05 - Business Processes (23.66 MB)
06 - Control Objectives (33.68 MB)
07 - Audit Planning and Management (38.34 MB)
08 - Laws and Regulations (15.66 MB)
09 - Evidence (45.91 MB)
10 - Sampling Methodologies (37.52 MB)
11 - Reporting and Communications (21.84 MB)
12 - Audit Quality Assurance (12.84 MB)
13 - Types of Audits (23.58 MB)
14 - Governance and Management of IT (33.8 MB)
15 - Information Systems Strategy (42.15 MB)
16 - Standards, Governance and Frameworks (36.76 MB)
17 - IT Organization (24.34 MB)
18 - Legal Compliance (34.41 MB)
19 - Enterprise Architecture (19.98 MB)
20 - Maintenance of Policies and Procedures (11.59 MB)
21 - Maturity Models (22.85 MB)
22 - Process Optimization (15.83 MB)
23 - IT Investment Strategies (21.74 MB)
24 - IT Vendor Selection and Management (35.94 MB)
25 - IT Risk Management (34.15 MB)
26 - Control Processes (17.12 MB)
27 - Quality Management Systems (16.48 MB)
28 - IT Performance Monitoring and Reporting (24.97 MB)
29 - BCP - Business Impact Analysis (33.05 MB)
30 - BCP Maintenance and Testing (14.47 MB)
31 - BCP - Invoke and Return to Normal (31.13 MB)
32 - Information Systems Acquisition, Development and Implementation (40.49 MB)
33 - Benefits Realization (20.51 MB)
34 - Vendor Management (31.71 MB)
35 - Project Governance (37.65 MB)
36 - Project Management (70.51 MB)
37 - Risk Management (24.07 MB)
38 - Requirements Management (32.22 MB)
39 - Application Architecture (22.15 MB)
40 - Methodologies (50.73 MB)
41 - Control Objectives and Techniques (45.07 MB)
42 - Testing (42.28 MB)
43 - Configuration and Change Management (28 MB)
44 - System Migration and Deployment (43.62 MB)
45 - Project Success Criteria (20.42 MB)
46 - Post-Implementation Reviews (19.11 MB)
47 - Information Systems Operations, Maintenance & Support (33.73 MB)
48 - Service Level Frameworks (25.77 MB)
49 - Service Level Management (30.47 MB)
50 - Monitor 3rd Party Compliance (18.54 MB)
51 - Architecture (47.23 MB)
52 - Computer Hardware, Software and Networks (91.99 MB)
53 - Software Resiliency Tools and Techniques (19.7 MB)
54 - Software Licensing and Inventory Interfaces (14.74 MB)
55 - Managing Schedules (24.72 MB)
56 - System Interface Integrity (43.07 MB)
57 - Capacity Planning (18.34 MB)
58 - Performance Monitoring (12.94 MB)
59 - Data Backup (22.48 MB)
60 - Database Administration Practices (37.3 MB)
61 - Data Quality and Retention (26.49 MB)
62 - Problem and Incident Management (22.37 MB)
63 - Managing Change to Production Environments (15.47 MB)
64 - Risks and Controls for End User Computing (25.3 MB)
65 - Disaster Recovery Legal and Contractual Issues (32.05 MB)
66 - Business Impact of Disaster Recovery (9.06 MB)
67 - Disaster Recovery Plan Maintenance (22.24 MB)
68 - Alternate Processing Sites (38.17 MB)
69 - Disaster Recovery Testing (16.89 MB)
70 - Invoking Disaster Recovery (26.45 MB)
71 - Protection of Information Assets (33.11 MB)
72 - Information Asset Protection (18.62 MB)
73 - Privacy Principles (27.03 MB)
74 - Security Controls (22.93 MB)
75 - Environmental Protection (27.62 MB)
76 - Physical Access Controls (21.24 MB)
77 - Logical Access Controls (16.08 MB)
78 - Identification and Authentication (13.6 MB)
79 - Virtual Systems (22.82 MB)
80 - Mobile Devices (14.93 MB)
81 - Voice Communication (19.97 MB)
82 - Internet Security, Protocols and Techniques (38.49 MB)
83 - Network Security Concerns (19 MB)
84 - Data Encryption (12.36 MB)
85 - Public Key Infrastructure (21.21 MB)
86 - Peer to Peer Computing (20.83 MB)
87 - Data Classification Standards (16.75 MB)
88 - Handling Confidential Data (18.09 MB)
89 - Data Leakage (17.16 MB)
90 - End-User Computing Security (22.14 MB)
91 - Security Awareness Program (17.39 MB)
92 - Cyber Attacks (29.52 MB)
93 - Detection Tools (19.56 MB)
94 - Security Testing Techniques (24.59 MB)
95 - Security Incidents (12.32 MB)
96 - Handling of Evidence (19.94 MB)
97 - Fraud Risk Factors (25.4 MB)
98 - Passing the Exam (30.78 MB)]
Screenshot
01 - CISA Overview (30.53 MB)
02 - The Process of Auditing Information Systems (44.85 MB)
03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (40.26 MB)
04 - Audit Risk Assessment (64.84 MB)
05 - Business Processes (23.66 MB)
06 - Control Objectives (33.68 MB)
07 - Audit Planning and Management (38.34 MB)
08 - Laws and Regulations (15.66 MB)
09 - Evidence (45.91 MB)
10 - Sampling Methodologies (37.52 MB)
11 - Reporting and Communications (21.84 MB)
12 - Audit Quality Assurance (12.84 MB)
13 - Types of Audits (23.58 MB)
14 - Governance and Management of IT (33.8 MB)
15 - Information Systems Strategy (42.15 MB)
16 - Standards, Governance and Frameworks (36.76 MB)
17 - IT Organization (24.34 MB)
18 - Legal Compliance (34.41 MB)
19 - Enterprise Architecture (19.98 MB)
20 - Maintenance of Policies and Procedures (11.59 MB)
21 - Maturity Models (22.85 MB)
22 - Process Optimization (15.83 MB)
23 - IT Investment Strategies (21.74 MB)
24 - IT Vendor Selection and Management (35.94 MB)
25 - IT Risk Management (34.15 MB)
26 - Control Processes (17.12 MB)
27 - Quality Management Systems (16.48 MB)
28 - IT Performance Monitoring and Reporting (24.97 MB)
29 - BCP - Business Impact Analysis (33.05 MB)
30 - BCP Maintenance and Testing (14.47 MB)
31 - BCP - Invoke and Return to Normal (31.13 MB)
32 - Information Systems Acquisition, Development and Implementation (40.49 MB)
33 - Benefits Realization (20.51 MB)
34 - Vendor Management (31.71 MB)
35 - Project Governance (37.65 MB)
36 - Project Management (70.51 MB)
37 - Risk Management (24.07 MB)
38 - Requirements Management (32.22 MB)
39 - Application Architecture (22.15 MB)
40 - Methodologies (50.73 MB)
41 - Control Objectives and Techniques (45.07 MB)
42 - Testing (42.28 MB)
43 - Configuration and Change Management (28 MB)
44 - System Migration and Deployment (43.62 MB)
45 - Project Success Criteria (20.42 MB)
46 - Post-Implementation Reviews (19.11 MB)
47 - Information Systems Operations, Maintenance & Support (33.73 MB)
48 - Service Level Frameworks (25.77 MB)
49 - Service Level Management (30.47 MB)
50 - Monitor 3rd Party Compliance (18.54 MB)
51 - Architecture (47.23 MB)
52 - Computer Hardware, Software and Networks (91.99 MB)
53 - Software Resiliency Tools and Techniques (19.7 MB)
54 - Software Licensing and Inventory Interfaces (14.74 MB)
55 - Managing Schedules (24.72 MB)
56 - System Interface Integrity (43.07 MB)
57 - Capacity Planning (18.34 MB)
58 - Performance Monitoring (12.94 MB)
59 - Data Backup (22.48 MB)
60 - Database Administration Practices (37.3 MB)
61 - Data Quality and Retention (26.49 MB)
62 - Problem and Incident Management (22.37 MB)
63 - Managing Change to Production Environments (15.47 MB)
64 - Risks and Controls for End User Computing (25.3 MB)
65 - Disaster Recovery Legal and Contractual Issues (32.05 MB)
66 - Business Impact of Disaster Recovery (9.06 MB)
67 - Disaster Recovery Plan Maintenance (22.24 MB)
68 - Alternate Processing Sites (38.17 MB)
69 - Disaster Recovery Testing (16.89 MB)
70 - Invoking Disaster Recovery (26.45 MB)
71 - Protection of Information Assets (33.11 MB)
72 - Information Asset Protection (18.62 MB)
73 - Privacy Principles (27.03 MB)
74 - Security Controls (22.93 MB)
75 - Environmental Protection (27.62 MB)
76 - Physical Access Controls (21.24 MB)
77 - Logical Access Controls (16.08 MB)
78 - Identification and Authentication (13.6 MB)
79 - Virtual Systems (22.82 MB)
80 - Mobile Devices (14.93 MB)
81 - Voice Communication (19.97 MB)
82 - Internet Security, Protocols and Techniques (38.49 MB)
83 - Network Security Concerns (19 MB)
84 - Data Encryption (12.36 MB)
85 - Public Key Infrastructure (21.21 MB)
86 - Peer to Peer Computing (20.83 MB)
87 - Data Classification Standards (16.75 MB)
88 - Handling Confidential Data (18.09 MB)
89 - Data Leakage (17.16 MB)
90 - End-User Computing Security (22.14 MB)
91 - Security Awareness Program (17.39 MB)
92 - Cyber Attacks (29.52 MB)
93 - Detection Tools (19.56 MB)
94 - Security Testing Techniques (24.59 MB)
95 - Security Incidents (12.32 MB)
96 - Handling of Evidence (19.94 MB)
97 - Fraud Risk Factors (25.4 MB)
98 - Passing the Exam (30.78 MB)]
Screenshot