Search Torrents
CBT Nuggets - ISACA CISA 2016...
Seeders: 10 Leechers: 47
|
CBT Nuggets - ISACA CISA 2016 Torrent content (File list)
|
|---|
| 01 - CISA Overview.mp4 30.5 MB |
| 02 - The Process of Auditing Information Systems.mp4 44.8 MB |
| 03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics.mp4 40.3 MB |
| 04 - Audit Risk Assessment.mp4 64.8 MB |
| 05 - Business Processes.mp4 23.7 MB |
| 06 - Control Objectives.mp4 33.7 MB |
| 07 - Audit Planning and Management.mp4 38.3 MB |
| 08 - Laws and Regulations.mp4 15.7 MB |
| 09 - Evidence.mp4 45.9 MB |
| 10 - Sampling Methodologies.mp4 37.5 MB |
| 11 - Reporting and Communications.mp4 21.8 MB |
| 12 - Audit Quality Assurance.mp4 12.8 MB |
| 13 - Types of Audits.mp4 23.6 MB |
| 14 - Governance and Management of IT.mp4 33.8 MB |
| 15 - Information Systems Strategy.mp4 42.1 MB |
| 16 - Standards, Governance and Frameworks.mp4 36.8 MB |
| 17 - IT Organization.mp4 24.3 MB |
| 18 - Legal Compliance.mp4 34.4 MB |
| 19 - Enterprise Architecture.mp4 20.0 MB |
| 20 - Maintenance of Policies and Procedures.mp4 11.6 MB |
| 21 - Maturity Models.mp4 22.8 MB |
| 22 - Process Optimization.mp4 15.8 MB |
| 23 - IT Investment Strategies.mp4 21.7 MB |
| 24 - IT Vendor Selection and Management.mp4 35.9 MB |
| 25 - IT Risk Management.mp4 34.2 MB |
| 26 - Control Processes.mp4 17.1 MB |
| 27 - Quality Management Systems.mp4 16.5 MB |
| 28 - IT Performance Monitoring and Reporting.mp4 25.0 MB |
| 29 - BCP - Business Impact Analysis.mp4 33.0 MB |
| 30 - BCP Maintenance and Testing.mp4 14.5 MB |
| 31 - BCP - Invoke and Return to Normal.mp4 31.1 MB |
| 32 - Information Systems Acquisition, Development and Implementation.mp4 40.5 MB |
| 33 - Benefits Realization.mp4 20.5 MB |
| 34 - Vendor Management.mp4 31.7 MB |
| 35 - Project Governance.mp4 37.6 MB |
| 36 - Project Management.mp4 70.5 MB |
| 37 - Risk Management.mp4 24.1 MB |
| 38 - Requirements Management.mp4 32.2 MB |
| 39 - Application Architecture.mp4 22.2 MB |
| 40 - Methodologies.mp4 50.7 MB |
| 41 - Control Objectives and Techniques.mp4 45.1 MB |
| 42 - Testing.mp4 42.3 MB |
| 43 - Configuration and Change Management.mp4 28.0 MB |
| 44 - System Migration and Deployment.mp4 43.6 MB |
| 45 - Project Success Criteria.mp4 20.4 MB |
| 46 - Post-Implementation Reviews.mp4 19.1 MB |
| 47 - Information Systems Operations, Maintenance & Support.mp4 33.7 MB |
| 48 - Service Level Frameworks.mp4 25.8 MB |
| 49 - Service Level Management.mp4 30.5 MB |
| 50 - Monitor 3rd Party Compliance.mp4 18.5 MB |
| 51 - Architecture.mp4 47.2 MB |
| 52 - Computer Hardware, Software and Networks.mp4 92.0 MB |
| 53 - Software Resiliency Tools and Techniques.mp4 19.7 MB |
| 54 - Software Licensing and Inventory Interfaces.mp4 14.7 MB |
| 55 - Managing Schedules.mp4 24.7 MB |
| 56 - System Interface Integrity.mp4 43.1 MB |
| 57 - Capacity Planning.mp4 18.3 MB |
| 58 - Performance Monitoring.mp4 12.9 MB |
| 59 - Data Backup.mp4 22.5 MB |
| 60 - Database Administration Practices.mp4 37.3 MB |
| 61 - Data Quality and Retention.mp4 26.5 MB |
| 62 - Problem and Incident Management.mp4 22.4 MB |
| 63 - Managing Change to Production Environments.mp4 15.5 MB |
| 64 - Risks and Controls for End User Computing.mp4 25.3 MB |
| 65 - Disaster Recovery Legal and Contractual Issues.mp4 32.1 MB |
| 66 - Business Impact of Disaster Recovery.mp4 9.1 MB |
| 67 - Disaster Recovery Plan Maintenance.mp4 22.2 MB |
| 68 - Alternate Processing Sites.mp4 38.2 MB |
| 69 - Disaster Recovery Testing.mp4 16.9 MB |
| 70 - Invoking Disaster Recovery.mp4 26.4 MB |
| 71 - Protection of Information Assets.mp4 33.1 MB |
| 72 - Information Asset Protection.mp4 18.6 MB |
| 73 - Privacy Principles.mp4 27.0 MB |
| 74 - Security Controls.mp4 22.9 MB |
| 75 - Environmental Protection.mp4 27.6 MB |
| 76 - Physical Access Controls.mp4 21.2 MB |
| 77 - Logical Access Controls.mp4 16.1 MB |
| 78 - Identification and Authentication.mp4 13.6 MB |
| 79 - Virtual Systems.mp4 22.8 MB |
| 80 - Mobile Devices.mp4 14.9 MB |
| 81 - Voice Communication.mp4 20.0 MB |
| 82 - Internet Security, Protocols and Techniques.mp4 38.5 MB |
| 83 - Network Security Concerns.mp4 19.0 MB |
| 84 - Data Encryption.mp4 12.4 MB |
| 85 - Public Key Infrastructure.mp4 21.2 MB |
| 86 - Peer to Peer Computing.mp4 20.8 MB |
| 87 - Data Classification Standards.mp4 16.7 MB |
| 88 - Handling Confidential Data.mp4 18.1 MB |
| 89 - Data Leakage.mp4 17.2 MB |
| 90 - End-User Computing Security.mp4 22.1 MB |
| 91 - Security Awareness Program.mp4 17.4 MB |
| 92 - Cyber Attacks.mp4 29.5 MB |
| 93 - Detection Tools.mp4 19.6 MB |
| 94 - Security Testing Techniques.mp4 24.6 MB |
| 95 - Security Incidents.mp4 12.3 MB |
| 96 - Handling of Evidence.mp4 19.9 MB |
| 97 - Fraud Risk Factors.mp4 25.4 MB |
| 98 - Passing the Exam.mp4 30.8 MB |
- Torrent indexed: 9 years
- Torrent updated: Monday 4th of April 2016 11:55:01 AM
- Torrent hash: 8EBEAD1B7C52338B200AC8F94C37AEB1698D58DA
- Torrent size: 2.6 GB
- Torrent category: Tutorials

Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
Comments