ISACA-CISA-Steve-Caseley-1ReQP
1. CISA Overview (11 min).i25.67MB
10. Compensating Controls (7 min).i21.02MB
11. Legacy Auditing (7 min).i23.53MB
12. Third Party Auditors (6 min).i19.03MB
13. Audit Report (7 min).i21.92MB
14. The Process of Auditing Infortion Systems (16 min).i57.10MB
15. IT Audit Standards Guidelines Tools and Techniques and Code of Ethics (12 min).i75.56MB
16. Audit Risk Assesent (20 min).i56.07MB
17. Control ob<x>jectives (9 min).i26.96MB
18. Audit Planning and nagement (10 min).i28.31MB
19. Business Processes (6 min).i18.89MB
2 Exam Fort (9 min).i19.68MB
20. Laws and Regulations (3 min).i11.78MB
21. Evidence (11 min).i30.84MB
22. Sampling Methodologies (9 min).i26.10MB
23. Reporting and Communications (5 min).i21.03MB
24. Audit Quality Assurance (3 min).i11.59MB
25. Governance and nagement of IT (14 min).i42.45MB
26. Standards Governance and fr<x>ameworks (10 min).i29.22MB
27. Infortion Systems Strategy (11 min).i31.41MB
28. IT Organization (6 min).i25.66MB
29. intenance of Policies and Procedures (3 min).i9.14MB
3. The CISA Review nual (7 min).i22.33MB
30. Enterprise Architecture (5 min).i17.47MB
31. Legal Compliance (9 min).i29.00MB
32. Quality nagement Systems (4 min).i11.78MB
33. turity Models (5 min).i14.76MB
34. Process Optimization (3 min).i11.15MB
35. IT Investment Practices (5 min).i16.46MB
36. IT Vendor Selection and nagement (9 min).i36.18MB
37. IT Risk nagement (9 min).i33.30MB
38. IT Perfornce Monitoring and Reporting (6 min).i41.44MB
39. BCP HR Policies (5 min).i17.20MB
4. Passing the Exam (8 min).i28.30MB
40. BCP Business Impact Analysis (8 min).i28.14MB
41. BCP intenance and Testing (4 min).i12.17MB
42. Infortion Systems Acquisition Development and Implementation (16 min).i45.87MB
43. Benefits Realization (6 min).i20.52MB
44. Project Governance (9 min).i36.85MB
45. Project nagement (19 min).i50.07MB
46. Risk nagement (7 min).i19.69MB
47. Architecture (12 min).i28.11MB
48. Vendor nagement (6 min).i17.57MB
49. Requirements nagement (8 min).i29.41MB
5. What does a CISA Auditor do (5 min).i16.67MB
50. Systems Development Life Cycle (SDLC) (12 min).i33.53MB
51. Control ob<x>jectives and Techniques (11 min).i30.74MB
52. Methodologies (13 min).i36.80MB
53. Testing (10 min).i31.33MB
54. Configuration and Change nagement (7 min).i19.45MB
55. System Migration and Deployment (11 min).i28.84MB
56. Post Implementation Reviews (4 min).i12.14MB
57. Infortion Systems Operations Maintenance & Support (6 min).i19.77MB
58. Service Level nagement (8 min).i24.06MB
59. Monitor 3rd Party Compliance (4 min).i15.09MB
6. Audit Standards (8 min).i28.25MB
60. naging Schedules (6 min).i22.48MB
61. Computer Hardware Software and Networks (23 min).i47.31MB
62. Computer Hardware Software and Networks (10 min.i29.38MB
63. Software Licensing and Inventory Interfaces (3 min).i19.09MB
. Databa<x>se Administration Practices (9 min).i31.65MB
65. Software Resiliency Tools and Techniques (4 min).i12.71MB
66. Capacity Planning (4 min).i16.03MB
67. Perfornce Monitoring (3 min).i11.99MB
68. Problem and Incident nagement (5 min).i12.28MB
69. naging Change to Production Environments (4 min).i10.92MB
7. Types of Audits (7 min).i21.78MB
70. Data Backup (5 min).i10.19MB
71. Disaster Recovery Legal and Contractual Issues (7 min).i17.57MB
72. Business Impact of Disaster Recovery (2 min).i5.77MB
73. Disaster Recovery Plan intenance (5 min).i12.99MB
74. Alternate Processing Sites (9 min).i20.86MB
75. Invoking Disaster Recovery (6 min).i13.60MB
76. Disaster Recovery Testing (4 min).i12.46MB
77. Protection of Infortion Assets (8 min).i27.57MB
78. Security Controls (5 min).i12.82MB
79. Security Incidents (3 min).i7.19MB
8. Control Self-Assesent (6 min).i20.76MB
80. Logical Access Controls (4 min).i9.85MB
81. Identification and Authentication (3 min).i7.90MB
82. Virtual Systems (5 min).i14.63MB
83. Network Security Concerns (4 min).i9.57MB
84. Internet Security Protocols and Techniques (9 min).i21.71MB
85. Cyber Attacks (7 min).i15.31MB
86. Detection Tools (4 min).i11.43MB
87. Security Testing Techniques (6 min).i26.77MB
88. Data Leakage (4 min).i8.88MB
89. Data Encryption (3 min).i6.51MB
9. Continuous Auditing (7 min).i25.12MB
90. Public Key Infrastructure (5 min).i10.90MB
91. Peer-to-Peer Computing (5 min).i13.03MB
92. Mobile Devices (3 min).i9.65MB
93. Voice Communication (5 min).i13.37MB
94. Handling of Evidence (5 min).i13.54MB
95. Data Classification Standards (4 min).i12.94MB
96. Physical Access Controls (5 min).i18.93MB
97. Environmental Protection (6 min).i19.32MB
98. Handling Confidential Data (6 min).i19.57MB
- CreateTime2023-02-23
- UpdateTime2023-03-11
- FileTotalCount99
- TotalSize4.27GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.ABS-121 2.ANND-001 3.BNDV-00558 4.LLJW-711 5.CWM-106 6.DSD-085 7.ETC-80 8.PSSD-220 9.BIB-062 10.AVGP-145 11.SDMT-106 12.EMU-059 13.MILD-690 14.YRZ-069 15.MDS-133 16.ONSD-599 17.MAMA-294 18.JUSD-343 19.HFD-075 20.FAX-392 21.JUC-107 22.ALD-360 23.MXSPS-061 24.DJSB-44 25.TKMDSH-010 26.MIBD-596 27.KWBD-050 28.AD-142 29.KWBD-050 30.PGD-522 31.RKI-257 32.RKI-261 33.MOBSP-005 34.JUC-700 35.MXBD-010 36.RKI-140 37.IDBD-262 38.BIB-028 39.CADV-234 40.DVH-641 41.PSSD-216 42.SAL-064 43.SGSR-056 44.NRAKX-03 45.SEED-65 46.NSPS-097 47.WAB-106 48.TDMJ-79 49.DIV-067 50.ZCOL-08 51.KAWD-412 52.MXSPS-275 53.MVBD-083 54.QEDZ-009 55.HITMA-104 56.HNU-017 57.ATFB-171 58.DUVV-003 59.SNS-426 60.VNDS-5023 61.WSE-007 62.HUNT-457 63.GCD-702 64.GKXR-011 65.MFDA-002 66.AVGL-103 67.SINO-246 68.SD-810 69.M-823 70.RG-476 71.121 72.001 73.00558 74.711 75.106 76.085 77.80 78.220 79.062 80.145 81.106 82.059 83.690 84.069 85.133 86.599 87.294 88.343 89.075 90.392 91.107 92.360 93.061 94.44 95.010 96.596 97.050 98.142 99.050 100.522 101.257 102.261 103.005 104.700 105.010 106.140 107.262 108.028 109.234 110.1 111.216 112.0 113.056 114.03 115.65 116.097 117.106 118.79 119.067 120.08 121.412 122.275 123.083 124.009 125.104 126.017 127.171 128.003 129.426 130.5023 131.007 132.457 133.702 134.011 135.002 136.103 137.246 138.810 139.823 140.476