本站已收录 番号和无损神作磁力链接/BT种子 

ISACA CISA Steve Caseley 2872015

种子简介

种子名称: ISACA CISA Steve Caseley 2872015
文件类型: 视频
文件数目: 98个文件
文件大小: 2.13 GB
收录时间: 2016-11-15 21:41
已经下载: 3
资源热度: 101
最近下载: 2024-7-28 10:30

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:b7718e200f9d880f6837a56fc2adeac11ce7aa9b&dn=ISACA CISA Steve Caseley 2872015 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

ISACA CISA Steve Caseley 2872015.torrent
  • 1. CISA Overview (11 min).avi25.67MB
  • 10. Compensating Controls (7 min).avi21.02MB
  • 11. Legacy Auditing (7 min).avi23.53MB
  • 12. Third Party Auditors (6 min).avi19.03MB
  • 13. Audit Report (7 min).avi21.92MB
  • 14. The Process of Auditing Information Systems (16 min).avi57.1MB
  • 15. IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics (12 min).avi75.56MB
  • 16. Audit Risk Assessment (20 min).avi56.07MB
  • 17. Control Objectives (9 min).avi26.96MB
  • 18. Audit Planning and Management (10 min).avi28.31MB
  • 19. Business Processes (6 min).avi18.89MB
  • 2 Exam Format (9 min).avi19.68MB
  • 20. Laws and Regulations (3 min).avi11.78MB
  • 21. Evidence (11 min).avi30.84MB
  • 22. Sampling Methodologies (9 min).avi26.1MB
  • 23. Reporting and Communications (5 min).avi21.03MB
  • 24. Audit Quality Assurance (3 min).avi11.59MB
  • 25. Governance and Management of IT (14 min).avi42.45MB
  • 26. Standards, Governance, and Frameworks (10 min).avi29.22MB
  • 27. Information Systems Strategy (11 min).avi31.41MB
  • 28. IT Organization (6 min).avi25.66MB
  • 29. Maintenance of Policies and Procedures (3 min).avi9.14MB
  • 3. The CISA Review Manual (7 min).avi22.33MB
  • 30. Enterprise Architecture (5 min).avi17.47MB
  • 31. Legal Compliance (9 min).avi29MB
  • 32. Quality Management Systems (4 min).avi11.78MB
  • 33. Maturity Models (5 min).avi14.76MB
  • 34. Process Optimization (3 min).avi11.15MB
  • 35. IT Investment Practices (5 min).avi16.46MB
  • 36. IT Vendor Selection and Management (9 min).avi36.18MB
  • 37. IT Risk Management (9 min).avi33.3MB
  • 38. IT Performance Monitoring and Reporting (6 min).avi41.44MB
  • 39. BCP HR Policies (5 min).avi17.2MB
  • 4. Passing the Exam (8 min).avi28.3MB
  • 40. BCP Business Impact Analysis (8 min).avi28.14MB
  • 41. BCP Maintenance and Testing (4 min).avi12.17MB
  • 42. Information Systems Acquisition, Development and Implementation (16 min).avi45.87MB
  • 43. Benefits Realization (6 min).avi20.52MB
  • 44. Project Governance (9 min).avi36.85MB
  • 45. Project Management (19 min).avi50.07MB
  • 46. Risk Management (7 min).avi19.69MB
  • 47. Architecture (12 min).avi28.11MB
  • 48. Vendor Management (6 min).avi17.57MB
  • 49. Requirements Management (8 min).avi29.41MB
  • 5. What does a CISA Auditor do (5 min).avi16.67MB
  • 50. Systems Development Life Cycle (SDLC) (12 min).avi33.53MB
  • 51. Control Objectives and Techniques (11 min).avi30.74MB
  • 52. Methodologies (13 min).avi36.8MB
  • 53. Testing (10 min).avi31.33MB
  • 54. Configuration and Change Management (7 min).avi19.45MB
  • 55. System Migration and Deployment (11 min).avi28.84MB
  • 56. Post Implementation Reviews (4 min).avi12.14MB
  • 57. Information Systems Operations, Maintenance & Support (6 min).avi19.77MB
  • 58. Service Level Management (8 min).avi24.06MB
  • 59. Monitor 3rd Party Compliance (4 min).avi15.09MB
  • 6. Audit Standards (8 min).avi28.25MB
  • 60. Managing Schedules (6 min).avi22.48MB
  • 61. Computer Hardware, Software, and Networks (23 min).avi47.31MB
  • 62. Computer Hardware, Software, and Networks (10 min.avi29.38MB
  • 63. Software Licensing and Inventory Interfaces (3 min).avi19.09MB
  • 64. Database Administration Practices (9 min).avi31.65MB
  • 65. Software Resiliency Tools and Techniques (4 min).avi12.71MB
  • 66. Capacity Planning (4 min).avi16.03MB
  • 67. Performance Monitoring (3 min).avi11.99MB
  • 68. Problem and Incident Management (5 min).avi12.28MB
  • 69. Managing Change to Production Environments (4 min).avi10.92MB
  • 7. Types of Audits (7 min).avi21.78MB
  • 70. Data Backup (5 min).avi10.19MB
  • 71. Disaster Recovery Legal and Contractual Issues (7 min).avi17.57MB
  • 72. Business Impact of Disaster Recovery (2 min).avi5.77MB
  • 73. Disaster Recovery Plan Maintenance (5 min).avi12.99MB
  • 74. Alternate Processing Sites (9 min).avi20.86MB
  • 75. Invoking Disaster Recovery (6 min).avi13.6MB
  • 76. Disaster Recovery Testing (4 min).avi12.46MB
  • 77. Protection of Information Assets (8 min).avi27.57MB
  • 78. Security Controls (5 min).avi12.82MB
  • 79. Security Incidents (3 min).avi7.19MB
  • 8. Control Self-Assessment (6 min).avi20.76MB
  • 80. Logical Access Controls (4 min).avi9.85MB
  • 81. Identification and Authentication (3 min).avi7.9MB
  • 82. Virtual Systems (5 min).avi14.63MB
  • 83. Network Security Concerns (4 min).avi9.57MB
  • 84. Internet Security, Protocols, and Techniques (9 min).avi21.71MB
  • 85. Cyber Attacks (7 min).avi15.31MB
  • 86. Detection Tools (4 min).avi11.43MB
  • 87. Security Testing Techniques (6 min).avi26.77MB
  • 88. Data Leakage (4 min).avi8.88MB
  • 89. Data Encryption (3 min).avi6.51MB
  • 9. Continuous Auditing (7 min).avi25.12MB
  • 90. Public Key Infrastructure (5 min).avi10.9MB
  • 91. Peer-to-Peer Computing (5 min).avi13.03MB
  • 92. Mobile Devices (3 min).avi9.65MB
  • 93. Voice Communication (5 min).avi13.37MB
  • 94. Handling of Evidence (5 min).avi13.54MB
  • 95. Data Classification Standards (4 min).avi12.94MB
  • 96. Physical Access Controls (5 min).avi18.93MB
  • 97. Environmental Protection (6 min).avi19.32MB
  • 98. Handling Confidential Data (6 min).avi19.57MB