Важное объявление!
У Нас Все раздачи мультитрекерные, при нуле пиров в релизах, можете смело вставать на закачку!
 
Автор Сообщение

HUNTER

Стаж:
4 года 4 месяца
Сообщений:
56808

Репутация: 101

[+] [-]
Вне форума [Профиль] [ЛС]

ISACA CISA
Год выпуска: 2015
Производитель: CBT Nuggets
Сайт производителя: www.cbtnuggets.com/it-training/isaca-cisa-2015
Автор: Steve Caseley
Продолжительность: 8 hours
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Этот курс охватывает ISACA СИСА целей. Без принятия всеобъемлющих планов обеспечения безопасности, политики и процедур, в вашей организации по обеспечению информационной безопасности может быть пропавших без вести что-то - и это все, что требуется в самом худшем.-This course covers ISACA CISA objectives. Without comprehensive security plans, policies, and procedures, your organization's information security could be missing something - and that's all it takes for the worst to happen.
As a Certified Information Systems Auditor (CISA), you'll perform business-critical functions by assessing your organization's IT and business systems to ensure they are monitored, controlled, and protected.
CISA is on the level of CISSP and CCIE in prestige - and in the way it distinguishes you from your peers. It's globally recognized within the IT industry and beyond, used by the US Department of Defense and others as a minimum requirement for many high-end security positions. And studies have found that having the CISA credential can increase your salary potential.

Содержание

1. CISA Overview (11 min)
2. Exam Format (9 min)
3. The CISA Review Manual (7 min)
4. Passing the Exam (8 min)
5. What does a CISA Auditor do? (5 min)
6. Audit Standards (8 min)
7. Types of Audits (7 min)
8. Control Self-Assessment (6 min)
9. Continuous Auditing (7 min)
10. Compensating Controls (7 min)
11. Legacy Auditing (7 min)
12. Third Party Auditors (6 min)
13. Audit Report (7 min)
14. The Process of Auditing Information Systems (16 min)
15. IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics (12 min)
16. Audit Risk Assessment (20 min)
17. Control Objectives (9 min)
18. Audit Planning and Management (10 min)
19. Business Processes (6 min)
20. Laws and Regulations (3 min)
21. Evidence (11 min)
22. Sampling Methodologies (9 min)
23. Reporting and Communications (5 min)
24. Audit Quality Assurance (3 min)
25. Governance and Management of IT (14 min)
26. Standards, Governance, and Frameworks (10 min)
27. Information Systems Strategy (11 min)
28. IT Organization (6 min)
29. Maintenance of Policies and Procedures (3 min)
30. Enterprise Architecture (5 min)
31. Legal Compliance (9 min)
32. Quality Management Systems (4 min)
33. Maturity Models (5 min)
34. Process Optimization (3 min)
35. IT Investment Practices (5 min)
36. IT Vendor Selection and Management (9 min)
37. IT Risk Management (9 min)
38. IT Performance Monitoring and Reporting (6 min)
39. BCP: HR Policies (5 min)
40. BCP: Business Impact Analysis (8 min)
41. BCP: Maintenance and Testing (4 min)
42. Information Systems Acquisition, Development and Implementation (16 min)
43. Benefits Realization (6 min)
44. Project Governance (9 min)
45. Project Management (19 min)
46. Risk Management (7 min)
47. Architecture (12 min)
48. Vendor Management (6 min)
49. Requirements Management (8 min)
50. Systems Development Life Cycle (SDLC) (12 min)
51. Control Objectives and Techniques (11 min)
52. Methodologies (13 min)
53. Testing (10 min)
54. Configuration and Change Management (7 min)
55. System Migration and Deployment (11 min)
56. Post Implementation Reviews (4 min)
57. Information Systems Operations, Maintenance & Support (6 min)
58. Service Level Management (8 min)
59. Monitor 3rd Party Compliance (4 min)
60. Managing Schedules (6 min)
61. Computer Hardware, Software, and Networks (23 min)
62. Computer Hardware, Software, and Networks (10 min)
63. Software Licensing and Inventory Interfaces (3 min)
64. Database Administration Practices (9 min)
65. Software Resiliency Tools and Techniques (4 min)
66. Capacity Planning (4 min)
67. Performance Monitoring (3 min)
68. Problem and Incident Management (5 min)
69. Managing Change to Production Environments (4 min)
70. Data Backup (5 min)
71. Disaster Recovery: Legal and Contractual Issues (7 min)
72. Business Impact of Disaster Recovery (2 min)
73. Disaster Recovery Plan Maintenance (5 min)
74. Alternate Processing Sites (9 min)
75. Invoking Disaster Recovery (6 min)
76. Disaster Recovery Testing (4 min)
77. Protection of Information Assets (8 min)
78. Security Controls (5 min)
79. Security Incidents (3 min)
80. Logical Access Controls (4 min)
81. Identification and Authentication (3 min)
82. Virtual Systems (5 min)
83. Network Security Concerns (4 min)
84. Internet Security, Protocols, and Techniques (9 min)
85. Cyber Attacks (7 min)
86. Detection Tools (4 min)
87. Security Testing Techniques (6 min)
88. Data Leakage (4 min)
89. Data Encryption (3 min)
90. Public Key Infrastructure (5 min)
91. Peer-to-Peer Computing (5 min)
92. Mobile Devices (3 min)
93. Voice Communication (5 min)
94. Handling of Evidence (5 min)
95. Data Classification Standards (4 min)
96. Physical Access Controls (5 min)
97. Environmental Protection (6 min)
98. Handling Confidential Data (6 min)
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 12.000 fps, ~ 500 Kbps
Аудио: AAC, 22.05 KHz, ~ 64.0 Kbps, 2 channels

Скриншоты


_________________
Показать сообщения:    

Текущее время: Сегодня 12:53

Часовой пояс: GMT



Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете голосовать в опросах
Вы не можете прикреплять файлы к сообщениям
Вы не можете скачивать файлы