种子简介
种子名称:
ISACA CISA Steve Caseley 2872015
文件类型:
视频
文件数目:
98个文件
文件大小:
2.13 GB
收录时间:
2016-11-15 21:41
已经下载:
3次
资源热度:
165
最近下载:
2025-3-24 19:01
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:b7718e200f9d880f6837a56fc2adeac11ce7aa9b&dn=ISACA CISA Steve Caseley 2872015
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
ISACA CISA Steve Caseley 2872015.torrent
1. CISA Overview (11 min).avi25.67MB
10. Compensating Controls (7 min).avi21.02MB
11. Legacy Auditing (7 min).avi23.53MB
12. Third Party Auditors (6 min).avi19.03MB
13. Audit Report (7 min).avi21.92MB
14. The Process of Auditing Information Systems (16 min).avi57.1MB
15. IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics (12 min).avi75.56MB
16. Audit Risk Assessment (20 min).avi56.07MB
17. Control Objectives (9 min).avi26.96MB
18. Audit Planning and Management (10 min).avi28.31MB
19. Business Processes (6 min).avi18.89MB
2 Exam Format (9 min).avi19.68MB
20. Laws and Regulations (3 min).avi11.78MB
21. Evidence (11 min).avi30.84MB
22. Sampling Methodologies (9 min).avi26.1MB
23. Reporting and Communications (5 min).avi21.03MB
24. Audit Quality Assurance (3 min).avi11.59MB
25. Governance and Management of IT (14 min).avi42.45MB
26. Standards, Governance, and Frameworks (10 min).avi29.22MB
27. Information Systems Strategy (11 min).avi31.41MB
28. IT Organization (6 min).avi25.66MB
29. Maintenance of Policies and Procedures (3 min).avi9.14MB
3. The CISA Review Manual (7 min).avi22.33MB
30. Enterprise Architecture (5 min).avi17.47MB
31. Legal Compliance (9 min).avi29MB
32. Quality Management Systems (4 min).avi11.78MB
33. Maturity Models (5 min).avi14.76MB
34. Process Optimization (3 min).avi11.15MB
35. IT Investment Practices (5 min).avi16.46MB
36. IT Vendor Selection and Management (9 min).avi36.18MB
37. IT Risk Management (9 min).avi33.3MB
38. IT Performance Monitoring and Reporting (6 min).avi41.44MB
39. BCP HR Policies (5 min).avi17.2MB
4. Passing the Exam (8 min).avi28.3MB
40. BCP Business Impact Analysis (8 min).avi28.14MB
41. BCP Maintenance and Testing (4 min).avi12.17MB
42. Information Systems Acquisition, Development and Implementation (16 min).avi45.87MB
43. Benefits Realization (6 min).avi20.52MB
44. Project Governance (9 min).avi36.85MB
45. Project Management (19 min).avi50.07MB
46. Risk Management (7 min).avi19.69MB
47. Architecture (12 min).avi28.11MB
48. Vendor Management (6 min).avi17.57MB
49. Requirements Management (8 min).avi29.41MB
5. What does a CISA Auditor do (5 min).avi16.67MB
50. Systems Development Life Cycle (SDLC) (12 min).avi33.53MB
51. Control Objectives and Techniques (11 min).avi30.74MB
52. Methodologies (13 min).avi36.8MB
53. Testing (10 min).avi31.33MB
54. Configuration and Change Management (7 min).avi19.45MB
55. System Migration and Deployment (11 min).avi28.84MB
56. Post Implementation Reviews (4 min).avi12.14MB
57. Information Systems Operations, Maintenance & Support (6 min).avi19.77MB
58. Service Level Management (8 min).avi24.06MB
59. Monitor 3rd Party Compliance (4 min).avi15.09MB
6. Audit Standards (8 min).avi28.25MB
60. Managing Schedules (6 min).avi22.48MB
61. Computer Hardware, Software, and Networks (23 min).avi47.31MB
62. Computer Hardware, Software, and Networks (10 min.avi29.38MB
63. Software Licensing and Inventory Interfaces (3 min).avi19.09MB
64. Database Administration Practices (9 min).avi31.65MB
65. Software Resiliency Tools and Techniques (4 min).avi12.71MB
66. Capacity Planning (4 min).avi16.03MB
67. Performance Monitoring (3 min).avi11.99MB
68. Problem and Incident Management (5 min).avi12.28MB
69. Managing Change to Production Environments (4 min).avi10.92MB
7. Types of Audits (7 min).avi21.78MB
70. Data Backup (5 min).avi10.19MB
71. Disaster Recovery Legal and Contractual Issues (7 min).avi17.57MB
72. Business Impact of Disaster Recovery (2 min).avi5.77MB
73. Disaster Recovery Plan Maintenance (5 min).avi12.99MB
74. Alternate Processing Sites (9 min).avi20.86MB
75. Invoking Disaster Recovery (6 min).avi13.6MB
76. Disaster Recovery Testing (4 min).avi12.46MB
77. Protection of Information Assets (8 min).avi27.57MB
78. Security Controls (5 min).avi12.82MB
79. Security Incidents (3 min).avi7.19MB
8. Control Self-Assessment (6 min).avi20.76MB
80. Logical Access Controls (4 min).avi9.85MB
81. Identification and Authentication (3 min).avi7.9MB
82. Virtual Systems (5 min).avi14.63MB
83. Network Security Concerns (4 min).avi9.57MB
84. Internet Security, Protocols, and Techniques (9 min).avi21.71MB
85. Cyber Attacks (7 min).avi15.31MB
86. Detection Tools (4 min).avi11.43MB
87. Security Testing Techniques (6 min).avi26.77MB
88. Data Leakage (4 min).avi8.88MB
89. Data Encryption (3 min).avi6.51MB
9. Continuous Auditing (7 min).avi25.12MB
90. Public Key Infrastructure (5 min).avi10.9MB
91. Peer-to-Peer Computing (5 min).avi13.03MB
92. Mobile Devices (3 min).avi9.65MB
93. Voice Communication (5 min).avi13.37MB
94. Handling of Evidence (5 min).avi13.54MB
95. Data Classification Standards (4 min).avi12.94MB
96. Physical Access Controls (5 min).avi18.93MB
97. Environmental Protection (6 min).avi19.32MB
98. Handling Confidential Data (6 min).avi19.57MB