zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
ISACA CISA Steve Caseley 2872015
magnet:?xt=urn:btih:b7718e200f9d880f6837a56fc2adeac11ce7aa9b&dn=ISACA CISA Steve Caseley 2872015
磁力链接详情
文件列表详情
b7718e200f9d880f6837a56fc2adeac11ce7aa9b
infohash:
98
文件数量
2.13 GB
文件大小
2016-11-15 21:41
创建日期
2024-11-29 20:22
最后访问
相关分词
ISACA
CISA
Steve
Caseley
2872015
1. CISA Overview (11 min).avi 25.67 MB
10. Compensating Controls (7 min).avi 21.02 MB
11. Legacy Auditing (7 min).avi 23.53 MB
12. Third Party Auditors (6 min).avi 19.03 MB
13. Audit Report (7 min).avi 21.92 MB
14. The Process of Auditing Information Systems (16 min).avi 57.1 MB
15. IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics (12 min).avi 75.56 MB
16. Audit Risk Assessment (20 min).avi 56.07 MB
17. Control Objectives (9 min).avi 26.96 MB
18. Audit Planning and Management (10 min).avi 28.31 MB
19. Business Processes (6 min).avi 18.89 MB
2 Exam Format (9 min).avi 19.68 MB
20. Laws and Regulations (3 min).avi 11.78 MB
21. Evidence (11 min).avi 30.84 MB
22. Sampling Methodologies (9 min).avi 26.1 MB
23. Reporting and Communications (5 min).avi 21.03 MB
24. Audit Quality Assurance (3 min).avi 11.59 MB
25. Governance and Management of IT (14 min).avi 42.45 MB
26. Standards, Governance, and Frameworks (10 min).avi 29.22 MB
27. Information Systems Strategy (11 min).avi 31.41 MB
28. IT Organization (6 min).avi 25.66 MB
29. Maintenance of Policies and Procedures (3 min).avi 9.14 MB
3. The CISA Review Manual (7 min).avi 22.33 MB
30. Enterprise Architecture (5 min).avi 17.47 MB
31. Legal Compliance (9 min).avi 29 MB
32. Quality Management Systems (4 min).avi 11.78 MB
33. Maturity Models (5 min).avi 14.76 MB
34. Process Optimization (3 min).avi 11.15 MB
35. IT Investment Practices (5 min).avi 16.46 MB
36. IT Vendor Selection and Management (9 min).avi 36.18 MB
37. IT Risk Management (9 min).avi 33.3 MB
38. IT Performance Monitoring and Reporting (6 min).avi 41.44 MB
39. BCP HR Policies (5 min).avi 17.2 MB
4. Passing the Exam (8 min).avi 28.3 MB
40. BCP Business Impact Analysis (8 min).avi 28.14 MB
41. BCP Maintenance and Testing (4 min).avi 12.17 MB
42. Information Systems Acquisition, Development and Implementation (16 min).avi 45.87 MB
43. Benefits Realization (6 min).avi 20.52 MB
44. Project Governance (9 min).avi 36.85 MB
45. Project Management (19 min).avi 50.07 MB
46. Risk Management (7 min).avi 19.69 MB
47. Architecture (12 min).avi 28.11 MB
48. Vendor Management (6 min).avi 17.57 MB
49. Requirements Management (8 min).avi 29.41 MB
5. What does a CISA Auditor do (5 min).avi 16.67 MB
50. Systems Development Life Cycle (SDLC) (12 min).avi 33.53 MB
51. Control Objectives and Techniques (11 min).avi 30.74 MB
52. Methodologies (13 min).avi 36.8 MB
53. Testing (10 min).avi 31.33 MB
54. Configuration and Change Management (7 min).avi 19.45 MB
55. System Migration and Deployment (11 min).avi 28.84 MB
56. Post Implementation Reviews (4 min).avi 12.14 MB
57. Information Systems Operations, Maintenance & Support (6 min).avi 19.77 MB
58. Service Level Management (8 min).avi 24.06 MB
59. Monitor 3rd Party Compliance (4 min).avi 15.09 MB
6. Audit Standards (8 min).avi 28.25 MB
60. Managing Schedules (6 min).avi 22.48 MB
61. Computer Hardware, Software, and Networks (23 min).avi 47.31 MB
62. Computer Hardware, Software, and Networks (10 min.avi 29.38 MB
63. Software Licensing and Inventory Interfaces (3 min).avi 19.09 MB
64. Database Administration Practices (9 min).avi 31.65 MB
65. Software Resiliency Tools and Techniques (4 min).avi 12.71 MB
66. Capacity Planning (4 min).avi 16.03 MB
67. Performance Monitoring (3 min).avi 11.99 MB
68. Problem and Incident Management (5 min).avi 12.28 MB
69. Managing Change to Production Environments (4 min).avi 10.92 MB
7. Types of Audits (7 min).avi 21.78 MB
70. Data Backup (5 min).avi 10.19 MB
71. Disaster Recovery Legal and Contractual Issues (7 min).avi 17.57 MB
72. Business Impact of Disaster Recovery (2 min).avi 5.77 MB
73. Disaster Recovery Plan Maintenance (5 min).avi 12.99 MB
74. Alternate Processing Sites (9 min).avi 20.86 MB
75. Invoking Disaster Recovery (6 min).avi 13.6 MB
76. Disaster Recovery Testing (4 min).avi 12.46 MB
77. Protection of Information Assets (8 min).avi 27.57 MB
78. Security Controls (5 min).avi 12.82 MB
79. Security Incidents (3 min).avi 7.19 MB
8. Control Self-Assessment (6 min).avi 20.76 MB
80. Logical Access Controls (4 min).avi 9.85 MB
81. Identification and Authentication (3 min).avi 7.9 MB
82. Virtual Systems (5 min).avi 14.63 MB
83. Network Security Concerns (4 min).avi 9.57 MB
84. Internet Security, Protocols, and Techniques (9 min).avi 21.71 MB
85. Cyber Attacks (7 min).avi 15.31 MB
86. Detection Tools (4 min).avi 11.43 MB
87. Security Testing Techniques (6 min).avi 26.77 MB
88. Data Leakage (4 min).avi 8.88 MB
89. Data Encryption (3 min).avi 6.51 MB
9. Continuous Auditing (7 min).avi 25.12 MB
90. Public Key Infrastructure (5 min).avi 10.9 MB
91. Peer-to-Peer Computing (5 min).avi 13.03 MB
92. Mobile Devices (3 min).avi 9.65 MB
93. Voice Communication (5 min).avi 13.37 MB
94. Handling of Evidence (5 min).avi 13.54 MB
95. Data Classification Standards (4 min).avi 12.94 MB
96. Physical Access Controls (5 min).avi 18.93 MB
97. Environmental Protection (6 min).avi 19.32 MB
98. Handling Confidential Data (6 min).avi 19.57 MB
其他位置