Сообщение

[CBT Nuggets / Steve Caseley] ISACA CISA 2016 [2016, ENG]

Сообщение Солнышко » 26 фев 2017, 14:23

ISACA CISA 2016

Год выпуска: 02/2016
Производитель: CBT Nuggets
Сайт производителя: cbtnuggets.com/it-training/isaca-cisa-2016
Автор: Steve Caseley
Продолжительность: 11:07
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: As a Certified Information Systems Auditor (CISA), you'll perform business-critical functions by assessing your organization's IT and business systems to ensure they are monitored, controlled, and protected.
CISA is on the level of CISSP and CCIE in prestige — and in the way it distinguishes you from your peers. CISA is globally recognized within the IT industry and beyond, and is used by the US Department of Defense and others as a minimum requirement for many high-end security positions. And studies have found that having the CISA credential can increase your salary potential.

Как сертифицированный аудитор информационных систем (cisa-и), вы будете выполнять критически важные бизнес-функции путем оценки ИТ и бизнес-систем, чтобы гарантировать, что они отслеживаются, контролируются и охраняются.
МКАП находится на уровне сертификата cissp и специалиста в престиж — и в путь это то, что отличает вас от ваших коллег. Cisa не является глобально признанным в ИТ-индустрии и за ее пределами, и используется Министерством обороны и другими как минимальное требование для многих высокого класса безопасности позиций. И исследования показали, что наличие в cisa учетных данных может увеличить вашу зарплату потенциал.
1. CISA Overview (7 min)
2. The Process of Auditing Information Systems (11 min)
3. IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (9 min)
4. Audit Risk Assessment (15 min)
5. Business Processes (5 min)
6. Control Objectives (8 min)
7. Audit Planning and Management (9 min)
8. Laws and Regulations (3 min)
9. Evidence (11 min)
10. Sampling Methodologies (9 min)
11. Reporting and Communications (5 min)
12. Audit Quality Assurance (3 min)
13. Types of Audits (5 min)
14. Governance and Management of IT (8 min)
15. Information Systems Strategy (10 min)
16. Standards, Governance and Frameworks (9 min)
17. IT Organization (6 min)
18. Legal Compliance (8 min)
19. Enterprise Architecture (4 min)
20. Maintenance of Policies and Procedures (2 min)
21. Maturity Models (5 min)
22. Process Optimization (3 min)
23. IT Investment Strategies (5 min)
24. IT Vendor Selection and Management (8 min)
25. IT Risk Management (8 min)
26. Control Processes (4 min)
27. Quality Management Systems (4 min)
28. IT Performance Monitoring and Reporting (6 min)
29. BCP - Business Impact Analysis (8 min)
30. BCP – Maintenance and Testing (3 min)
31. BCP - Invoke and Return to Normal (7 min)
32. Information Systems Acquisition, Development and Implementation (9 min)
33. Benefits Realization (5 min)
34. Vendor Management (7 min)
35. Project Governance (9 min)
36. Project Management (17 min)
37. Risk Management (5 min)
38. Requirements Management (7 min)
39. Application Architecture (5 min)
40. Methodologies (12 min)
41. Control Objectives and Techniques (11 min)
42. Testing (10 min)
43. Configuration and Change Management (6 min)
44. System Migration and Deployment (10 min)
45. Project Success Criteria (5 min)
46. Post-Implementation Reviews (4 min)
47. Information Systems Operations, Maintenance & Support (8 min)
48. Service Level Frameworks (6 min)
49. Service Level Management (7 min)
50. Monitor 3rd Party Compliance (4 min)
51. Architecture (11 min)
52. Computer Hardware, Software and Networks (22 min)
53. Software Resiliency Tools and Techniques (4 min)
54. Software Licensing and Inventory Interfaces (3 min)
55. Managing Schedules (6 min)
56. System Interface Integrity (10 min)
57. Capacity Planning (4 min)
58. Performance Monitoring (3 min)
59. Data Backup (5 min)
60. Database Administration Practices (9 min)
61. Data Quality and Retention (6 min)
62. Problem and Incident Management (5 min)
63. Managing Change to Production Environments (3 min)
64. Risks and Controls for End User Computing (6 min)
65. Disaster Recovery – Legal and Contractual Issues (7 min)
66. Business Impact of Disaster Recovery (2 min)
67. Disaster Recovery Plan Maintenance (5 min)
68. Alternate Processing Sites (9 min)
69. Disaster Recovery Testing (4 min)
70. Invoking Disaster Recovery (6 min)
71. Protection of Information Assets (8 min)
72. Information Asset Protection (4 min)
73. Privacy Principles (6 min)
74. Security Controls (5 min)
75. Environmental Protection (6 min)
76. Physical Access Controls (5 min)
77. Logical Access Controls (3 min)
78. Identification and Authentication (3 min)
79. Virtual Systems (5 min)
80. Mobile Devices (3 min)
81. Voice Communication (4 min)
82. Internet Security, Protocols and Techniques (9 min)
83. Network Security Concerns (4 min)
84. Data Encryption (3 min)
85. Public Key Infrastructure (5 min)
86. Peer to Peer Computing (5 min)
87. Data Classification Standards (4 min)
88. Handling Confidential Data (4 min)
89. Data Leakage (4 min)
90. End-User Computing Security (5 min)
91. Security Awareness Program (4 min)
92. Cyber Attacks (7 min)
93. Detection Tools (4 min)
94. Security Testing Techniques (6 min)
95. Security Incidents (3 min)
96. Handling of Evidence (4 min)
97. Fraud Risk Factors (6 min)
98. Passing the Exam (7 min)
"Let me introduce you to the wonderful world of project management, one of the most fascinating career paths available today. I find being a project manager (PM) extremely fulfilling, because it lets me do a wide variety of different things every day and call it my ‘job.’"
Steve has taught project management at several universities, at both the graduate and undergraduate level. He has also developed and delivered project management training programs for organizations all over the world. Steve’s project delivery experience encompasses a wide range of industries and software applications ranging from government to private organizations and engineering R&D organizations. Projects Steve has delivered for software applications range from traditional financial, human resources, retail, and order management applications to real-time control and monitoring systems. As a result, Steve has plenty of real-world project delivery experiences, with lots of lessons learned and much to share.
Файлы примеров: не предусмотрены
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 15fps, 500kbps
Аудио: AAC, 22.05kHz, 64kbps, stereo

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 14:23
Размер: 2.65 ГБ
Размер: 2 843 544 776 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 19.96 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность