CBT Nuggets - ISACA CISA 2016 - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: CBT Nuggets - ISACA CISA 2016 (/Thread-CBT-Nuggets-ISACA-CISA-2016--695729) |
CBT Nuggets - ISACA CISA 2016 - AD-TEAM - 11-27-2024 2.65 GB | 00:22:38 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
01 - CISA Overview (30.53 MB) 02 - The Process of Auditing Information Systems (44.85 MB) 03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (40.26 MB) 04 - Audit Risk Assessment (64.84 MB) 05 - Business Processes (23.66 MB) 06 - Control Objectives (33.68 MB) 07 - Audit Planning and Management (38.34 MB) 08 - Laws and Regulations (15.66 MB) 09 - Evidence (45.91 MB) 10 - Sampling Methodologies (37.52 MB) 11 - Reporting and Communications (21.84 MB) 12 - Audit Quality Assurance (12.84 MB) 13 - Types of Audits (23.58 MB) 14 - Governance and Management of IT (33.8 MB) 15 - Information Systems Strategy (42.15 MB) 16 - Standards, Governance and Frameworks (36.76 MB) 17 - IT Organization (24.34 MB) 18 - Legal Compliance (34.41 MB) 19 - Enterprise Architecture (19.98 MB) 20 - Maintenance of Policies and Procedures (11.59 MB) 21 - Maturity Models (22.85 MB) 22 - Process Optimization (15.83 MB) 23 - IT Investment Strategies (21.74 MB) 24 - IT Vendor Selection and Management (35.94 MB) 25 - IT Risk Management (34.15 MB) 26 - Control Processes (17.12 MB) 27 - Quality Management Systems (16.48 MB) 28 - IT Performance Monitoring and Reporting (24.97 MB) 29 - BCP - Business Impact Analysis (33.05 MB) 30 - BCP Maintenance and Testing (14.47 MB) 31 - BCP - Invoke and Return to Normal (31.13 MB) 32 - Information Systems Acquisition, Development and Implementation (40.49 MB) 33 - Benefits Realization (20.51 MB) 34 - Vendor Management (31.71 MB) 35 - Project Governance (37.65 MB) 36 - Project Management (70.51 MB) 37 - Risk Management (24.07 MB) 38 - Requirements Management (32.22 MB) 39 - Application Architecture (22.15 MB) 40 - Methodologies (50.73 MB) 41 - Control Objectives and Techniques (45.07 MB) 42 - Testing (42.28 MB) 43 - Configuration and Change Management (28 MB) 44 - System Migration and Deployment (43.62 MB) 45 - Project Success Criteria (20.42 MB) 46 - Post-Implementation Reviews (19.11 MB) 47 - Information Systems Operations, Maintenance & Support (33.73 MB) 48 - Service Level Frameworks (25.77 MB) 49 - Service Level Management (30.47 MB) 50 - Monitor 3rd Party Compliance (18.54 MB) 51 - Architecture (47.23 MB) 52 - Computer Hardware, Software and Networks (91.99 MB) 53 - Software Resiliency Tools and Techniques (19.7 MB) 54 - Software Licensing and Inventory Interfaces (14.74 MB) 55 - Managing Schedules (24.72 MB) 56 - System Interface Integrity (43.07 MB) 57 - Capacity Planning (18.34 MB) 58 - Performance Monitoring (12.94 MB) 59 - Data Backup (22.48 MB) 60 - Database Administration Practices (37.3 MB) 61 - Data Quality and Retention (26.49 MB) 62 - Problem and Incident Management (22.37 MB) 63 - Managing Change to Production Environments (15.47 MB) 64 - Risks and Controls for End User Computing (25.3 MB) 65 - Disaster Recovery Legal and Contractual Issues (32.05 MB) 66 - Business Impact of Disaster Recovery (9.06 MB) 67 - Disaster Recovery Plan Maintenance (22.24 MB) 68 - Alternate Processing Sites (38.17 MB) 69 - Disaster Recovery Testing (16.89 MB) 70 - Invoking Disaster Recovery (26.45 MB) 71 - Protection of Information Assets (33.11 MB) 72 - Information Asset Protection (18.62 MB) 73 - Privacy Principles (27.03 MB) 74 - Security Controls (22.93 MB) 75 - Environmental Protection (27.62 MB) 76 - Physical Access Controls (21.24 MB) 77 - Logical Access Controls (16.08 MB) 78 - Identification and Authentication (13.6 MB) 79 - Virtual Systems (22.82 MB) 80 - Mobile Devices (14.93 MB) 81 - Voice Communication (19.97 MB) 82 - Internet Security, Protocols and Techniques (38.49 MB) 83 - Network Security Concerns (19 MB) 84 - Data Encryption (12.36 MB) 85 - Public Key Infrastructure (21.21 MB) 86 - Peer to Peer Computing (20.83 MB) 87 - Data Classification Standards (16.75 MB) 88 - Handling Confidential Data (18.09 MB) 89 - Data Leakage (17.16 MB) 90 - End-User Computing Security (22.14 MB) 91 - Security Awareness Program (17.39 MB) 92 - Cyber Attacks (29.52 MB) 93 - Detection Tools (19.56 MB) 94 - Security Testing Techniques (24.59 MB) 95 - Security Incidents (12.32 MB) 96 - Handling of Evidence (19.94 MB) 97 - Fraud Risk Factors (25.4 MB) 98 - Passing the Exam (30.78 MB)] Screenshot
DDownload
RapidGator TurboBit |