zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
CBT Nuggets - ISACA CISA 2016
magnet:?xt=urn:btih:8ebead1b7c52338b200ac8f94c37aeb1698d58da&dn=CBT Nuggets - ISACA CISA 2016
磁力链接详情
文件列表详情
8ebead1b7c52338b200ac8f94c37aeb1698d58da
infohash:
98
文件数量
2.65 GB
文件大小
2016-9-25 09:01
创建日期
2024-12-11 16:46
最后访问
相关分词
CBT
Nuggets
-
ISACA
CISA
2016
01 - CISA Overview.mp4 30.53 MB
02 - The Process of Auditing Information Systems.mp4 44.85 MB
03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics.mp4 40.26 MB
04 - Audit Risk Assessment.mp4 64.84 MB
05 - Business Processes.mp4 23.66 MB
06 - Control Objectives.mp4 33.68 MB
07 - Audit Planning and Management.mp4 38.34 MB
08 - Laws and Regulations.mp4 15.66 MB
09 - Evidence.mp4 45.91 MB
10 - Sampling Methodologies.mp4 37.52 MB
11 - Reporting and Communications.mp4 21.84 MB
12 - Audit Quality Assurance.mp4 12.84 MB
13 - Types of Audits.mp4 23.58 MB
14 - Governance and Management of IT.mp4 33.8 MB
15 - Information Systems Strategy.mp4 42.15 MB
16 - Standards, Governance and Frameworks.mp4 36.76 MB
17 - IT Organization.mp4 24.34 MB
18 - Legal Compliance.mp4 34.41 MB
19 - Enterprise Architecture.mp4 19.98 MB
20 - Maintenance of Policies and Procedures.mp4 11.59 MB
21 - Maturity Models.mp4 22.85 MB
22 - Process Optimization.mp4 15.83 MB
23 - IT Investment Strategies.mp4 21.74 MB
24 - IT Vendor Selection and Management.mp4 35.94 MB
25 - IT Risk Management.mp4 34.15 MB
26 - Control Processes.mp4 17.12 MB
27 - Quality Management Systems.mp4 16.48 MB
28 - IT Performance Monitoring and Reporting.mp4 24.97 MB
29 - BCP - Business Impact Analysis.mp4 33.05 MB
30 - BCP Maintenance and Testing.mp4 14.47 MB
31 - BCP - Invoke and Return to Normal.mp4 31.13 MB
32 - Information Systems Acquisition, Development and Implementation.mp4 40.49 MB
33 - Benefits Realization.mp4 20.51 MB
34 - Vendor Management.mp4 31.71 MB
35 - Project Governance.mp4 37.65 MB
36 - Project Management.mp4 70.51 MB
37 - Risk Management.mp4 24.07 MB
38 - Requirements Management.mp4 32.22 MB
39 - Application Architecture.mp4 22.15 MB
40 - Methodologies.mp4 50.73 MB
41 - Control Objectives and Techniques.mp4 45.07 MB
42 - Testing.mp4 42.28 MB
43 - Configuration and Change Management.mp4 28 MB
44 - System Migration and Deployment.mp4 43.62 MB
45 - Project Success Criteria.mp4 20.42 MB
46 - Post-Implementation Reviews.mp4 19.11 MB
47 - Information Systems Operations, Maintenance & Support.mp4 33.73 MB
48 - Service Level Frameworks.mp4 25.77 MB
49 - Service Level Management.mp4 30.47 MB
50 - Monitor 3rd Party Compliance.mp4 18.54 MB
51 - Architecture.mp4 47.23 MB
52 - Computer Hardware, Software and Networks.mp4 91.99 MB
53 - Software Resiliency Tools and Techniques.mp4 19.7 MB
54 - Software Licensing and Inventory Interfaces.mp4 14.74 MB
55 - Managing Schedules.mp4 24.72 MB
56 - System Interface Integrity.mp4 43.07 MB
57 - Capacity Planning.mp4 18.34 MB
58 - Performance Monitoring.mp4 12.94 MB
59 - Data Backup.mp4 22.48 MB
60 - Database Administration Practices.mp4 37.3 MB
61 - Data Quality and Retention.mp4 26.49 MB
62 - Problem and Incident Management.mp4 22.37 MB
63 - Managing Change to Production Environments.mp4 15.47 MB
64 - Risks and Controls for End User Computing.mp4 25.3 MB
65 - Disaster Recovery Legal and Contractual Issues.mp4 32.05 MB
66 - Business Impact of Disaster Recovery.mp4 9.06 MB
67 - Disaster Recovery Plan Maintenance.mp4 22.24 MB
68 - Alternate Processing Sites.mp4 38.17 MB
69 - Disaster Recovery Testing.mp4 16.89 MB
70 - Invoking Disaster Recovery.mp4 26.45 MB
71 - Protection of Information Assets.mp4 33.11 MB
72 - Information Asset Protection.mp4 18.62 MB
73 - Privacy Principles.mp4 27.03 MB
74 - Security Controls.mp4 22.93 MB
75 - Environmental Protection.mp4 27.62 MB
76 - Physical Access Controls.mp4 21.24 MB
77 - Logical Access Controls.mp4 16.08 MB
78 - Identification and Authentication.mp4 13.6 MB
79 - Virtual Systems.mp4 22.82 MB
80 - Mobile Devices.mp4 14.93 MB
81 - Voice Communication.mp4 19.97 MB
82 - Internet Security, Protocols and Techniques.mp4 38.49 MB
83 - Network Security Concerns.mp4 19 MB
84 - Data Encryption.mp4 12.36 MB
85 - Public Key Infrastructure.mp4 21.21 MB
86 - Peer to Peer Computing.mp4 20.83 MB
87 - Data Classification Standards.mp4 16.75 MB
88 - Handling Confidential Data.mp4 18.09 MB
89 - Data Leakage.mp4 17.16 MB
90 - End-User Computing Security.mp4 22.14 MB
91 - Security Awareness Program.mp4 17.39 MB
92 - Cyber Attacks.mp4 29.52 MB
93 - Detection Tools.mp4 19.56 MB
94 - Security Testing Techniques.mp4 24.59 MB
95 - Security Incidents.mp4 12.32 MB
96 - Handling of Evidence.mp4 19.94 MB
97 - Fraud Risk Factors.mp4 25.4 MB
98 - Passing the Exam.mp4 30.78 MB
其他位置