PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

CBT Nuggets - ISACA CISA 2016

Category: Courses / Others
Author: AD-TEAM
Date added: 27.11.2024 :39:46
Views: 0
Comments: 0










Description material
CBT Nuggets - ISACA CISA 2016
2.65 GB | 00:22:38 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English



Files Included :
01 - CISA Overview (30.53 MB)
02 - The Process of Auditing Information Systems (44.85 MB)
03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (40.26 MB)
04 - Audit Risk Assessment (64.84 MB)
05 - Business Processes (23.66 MB)
06 - Control Objectives (33.68 MB)
07 - Audit Planning and Management (38.34 MB)
08 - Laws and Regulations (15.66 MB)
09 - Evidence (45.91 MB)
10 - Sampling Methodologies (37.52 MB)
11 - Reporting and Communications (21.84 MB)
12 - Audit Quality Assurance (12.84 MB)
13 - Types of Audits (23.58 MB)
14 - Governance and Management of IT (33.8 MB)
15 - Information Systems Strategy (42.15 MB)
16 - Standards, Governance and Frameworks (36.76 MB)
17 - IT Organization (24.34 MB)
18 - Legal Compliance (34.41 MB)
19 - Enterprise Architecture (19.98 MB)
20 - Maintenance of Policies and Procedures (11.59 MB)
21 - Maturity Models (22.85 MB)
22 - Process Optimization (15.83 MB)
23 - IT Investment Strategies (21.74 MB)
24 - IT Vendor Selection and Management (35.94 MB)
25 - IT Risk Management (34.15 MB)
26 - Control Processes (17.12 MB)
27 - Quality Management Systems (16.48 MB)
28 - IT Performance Monitoring and Reporting (24.97 MB)
29 - BCP - Business Impact Analysis (33.05 MB)
30 - BCP Maintenance and Testing (14.47 MB)
31 - BCP - Invoke and Return to Normal (31.13 MB)
32 - Information Systems Acquisition, Development and Implementation (40.49 MB)
33 - Benefits Realization (20.51 MB)
34 - Vendor Management (31.71 MB)
35 - Project Governance (37.65 MB)
36 - Project Management (70.51 MB)
37 - Risk Management (24.07 MB)
38 - Requirements Management (32.22 MB)
39 - Application Architecture (22.15 MB)
40 - Methodologies (50.73 MB)
41 - Control Objectives and Techniques (45.07 MB)
42 - Testing (42.28 MB)
43 - Configuration and Change Management (28 MB)
44 - System Migration and Deployment (43.62 MB)
45 - Project Success Criteria (20.42 MB)
46 - Post-Implementation Reviews (19.11 MB)
47 - Information Systems Operations, Maintenance & Support (33.73 MB)
48 - Service Level Frameworks (25.77 MB)
49 - Service Level Management (30.47 MB)
50 - Monitor 3rd Party Compliance (18.54 MB)
51 - Architecture (47.23 MB)
52 - Computer Hardware, Software and Networks (91.99 MB)
53 - Software Resiliency Tools and Techniques (19.7 MB)
54 - Software Licensing and Inventory Interfaces (14.74 MB)
55 - Managing Schedules (24.72 MB)
56 - System Interface Integrity (43.07 MB)
57 - Capacity Planning (18.34 MB)
58 - Performance Monitoring (12.94 MB)
59 - Data Backup (22.48 MB)
60 - Database Administration Practices (37.3 MB)
61 - Data Quality and Retention (26.49 MB)
62 - Problem and Incident Management (22.37 MB)
63 - Managing Change to Production Environments (15.47 MB)
64 - Risks and Controls for End User Computing (25.3 MB)
65 - Disaster Recovery Legal and Contractual Issues (32.05 MB)
66 - Business Impact of Disaster Recovery (9.06 MB)
67 - Disaster Recovery Plan Maintenance (22.24 MB)
68 - Alternate Processing Sites (38.17 MB)
69 - Disaster Recovery Testing (16.89 MB)
70 - Invoking Disaster Recovery (26.45 MB)
71 - Protection of Information Assets (33.11 MB)
72 - Information Asset Protection (18.62 MB)
73 - Privacy Principles (27.03 MB)
74 - Security Controls (22.93 MB)
75 - Environmental Protection (27.62 MB)
76 - Physical Access Controls (21.24 MB)
77 - Logical Access Controls (16.08 MB)
78 - Identification and Authentication (13.6 MB)
79 - Virtual Systems (22.82 MB)
80 - Mobile Devices (14.93 MB)
81 - Voice Communication (19.97 MB)
82 - Internet Security, Protocols and Techniques (38.49 MB)
83 - Network Security Concerns (19 MB)
84 - Data Encryption (12.36 MB)
85 - Public Key Infrastructure (21.21 MB)
86 - Peer to Peer Computing (20.83 MB)
87 - Data Classification Standards (16.75 MB)
88 - Handling Confidential Data (18.09 MB)
89 - Data Leakage (17.16 MB)
90 - End-User Computing Security (22.14 MB)
91 - Security Awareness Program (17.39 MB)
92 - Cyber Attacks (29.52 MB)
93 - Detection Tools (19.56 MB)
94 - Security Testing Techniques (24.59 MB)
95 - Security Incidents (12.32 MB)
96 - Handling of Evidence (19.94 MB)
97 - Fraud Risk Factors (25.4 MB)
98 - Passing the Exam (30.78 MB)]
Screenshot


Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: