Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:
CBT Nuggets ISACA CISA €15 buy download

2015
CBT Nuggets
Steve Caseley
8 hours
English

This course covers ISACA CISA objectives. Without comprehensive security plans, policies, and procedures, your organization's information security could be missing something - and that's all it takes for the worst to happen.
As a Certified Information Systems Auditor (CISA), you'll perform business-critical functions by assessing your organization's IT and business systems to ensure they are monitored, controlled, and protected.
CISA is on the level of CISSP and CCIE in prestige - and in the way it distinguishes you from your peers. It's globally recognized within the IT industry and beyond, used by the US Department of Defense and others as a minimum requirement for many high-end security positions. And studies have found that having the CISA credential can increase your salary potential.

1. CISA Overview (11 min)
2. Exam Format (9 min)
3. The CISA Review Manual (7 min)
4. Passing the Exam (8 min)
5. What does a CISA Auditor do? (5 min)
6. Audit Standards (8 min)
7. Types of Audits (7 min)
8. Control Self-Assessment (6 min)
9. Continuous Auditing (7 min)
10. Compensating Controls (7 min)
11. Legacy Auditing (7 min)
12. Third Party Auditors (6 min)
13. Audit Report (7 min)
14. The Process of Auditing Information Systems (16 min)
15. IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics (12 min)
16. Audit Risk Assessment (20 min)
17. Control Objectives (9 min)
18. Audit Planning and Management (10 min)
19. Business Processes (6 min)
20. Laws and Regulations (3 min)
21. Evidence (11 min)
22. Sampling Methodologies (9 min)
23. Reporting and Communications (5 min)
24. Audit Quality Assurance (3 min)
25. Governance and Management of IT (14 min)
26. Standards, Governance, and Frameworks (10 min)
27. Information Systems Strategy (11 min)
28. IT Organization (6 min)
29. Maintenance of Policies and Procedures (3 min)
30. Enterprise Architecture (5 min)
31. Legal Compliance (9 min)
32. Quality Management Systems (4 min)
33. Maturity Models (5 min)
34. Process Optimization (3 min)
35. IT Investment Practices (5 min)
36. IT Vendor Selection and Management (9 min)
37. IT Risk Management (9 min)
38. IT Performance Monitoring and Reporting (6 min)
39. BCP: HR Policies (5 min)
40. BCP: Business Impact Analysis (8 min)
41. BCP: Maintenance and Testing (4 min)
42. Information Systems Acquisition, Development and Implementation (16 min)
43. Benefits Realization (6 min)
44. Project Governance (9 min)
45. Project Management (19 min)
46. Risk Management (7 min)
47. Architecture (12 min)
48. Vendor Management (6 min)
49. Requirements Management (8 min)
50. Systems Development Life Cycle (SDLC) (12 min)
51. Control Objectives and Techniques (11 min)
52. Methodologies (13 min)
53. Testing (10 min)
54. Configuration and Change Management (7 min)
55. System Migration and Deployment (11 min)
56. Post Implementation Reviews (4 min)
57. Information Systems Operations, Maintenance & Support (6 min)
58. Service Level Management (8 min)
59. Monitor 3rd Party Compliance (4 min)
60. Managing Schedules (6 min)
61. Computer Hardware, Software, and Networks (23 min)
62. Computer Hardware, Software, and Networks (10 min)
63. Software Licensing and Inventory Interfaces (3 min)
64. Database Administration Practices (9 min)
65. Software Resiliency Tools and Techniques (4 min)
66. Capacity Planning (4 min)
67. Performance Monitoring (3 min)
68. Problem and Incident Management (5 min)
69. Managing Change to Production Environments (4 min)
70. Data Backup (5 min)
71. Disaster Recovery: Legal and Contractual Issues (7 min)
72. Business Impact of Disaster Recovery (2 min)
73. Disaster Recovery Plan Maintenance (5 min)
74. Alternate Processing Sites (9 min)
75. Invoking Disaster Recovery (6 min)
76. Disaster Recovery Testing (4 min)
77. Protection of Information Assets (8 min)
78. Security Controls (5 min)
79. Security Incidents (3 min)
80. Logical Access Controls (4 min)
81. Identification and Authentication (3 min)
82. Virtual Systems (5 min)
83. Network Security Concerns (4 min)
84. Internet Security, Protocols, and Techniques (9 min)
85. Cyber Attacks (7 min)
86. Detection Tools (4 min)
87. Security Testing Techniques (6 min)
88. Data Leakage (4 min)
89. Data Encryption (3 min)
90. Public Key Infrastructure (5 min)
91. Peer-to-Peer Computing (5 min)
92. Mobile Devices (3 min)
93. Voice Communication (5 min)
94. Handling of Evidence (5 min)
95. Data Classification Standards (4 min)
96. Physical Access Controls (5 min)
97. Environmental Protection (6 min)
98. Handling Confidential Data (6 min)

www.cbtnuggets.com/it-training/isaca-cisa-2015



Download File Size:931.76 MB


CBT Nuggets ISACA CISA
€15
Customers who bought this program also bought:

Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





AutoCAD 2023 €110


SolidWorks 2022 €115


AutoCAD 2023 for Mac €110






Autodesk Revit 2023 €140

             

Autodesk Product Design Suite Ultimate €252






CorelDRAW Graphics Suite 2021.5 for Mac €65

             

Adobe Master Collection 2021 for Mac €260