Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001 - CISA (Certified Information Systems Auditor) - Introduction.mp4 |
207.93Мб |
002 - Module Intro.mp4 |
59.60Мб |
003 - Learning objectives.mp4 |
52.45Мб |
004 - 1.1 Understanding the Audit Function.mp4 |
97.15Мб |
005 - 1.2 Adhering to ISACA IS Audit and Assurance Standards and Guidelines.mp4 |
106.53Мб |
006 - 1.3 Identifying the Risk _ Audit Relationship.mp4 |
84.58Мб |
007 - 1.4 Surveying IS Controls.mp4 |
106.36Мб |
008 - Lesson 1 Review.mp4 |
90.16Мб |
009 - Learning objectives.mp4 |
45.79Мб |
010 - 2.1 Performing an IS Audit.mp4 |
71.17Мб |
011 - 2.2 Gathering Audit Evidence.mp4 |
112.13Мб |
012 - 2.3 Understanding Sampling Techniques.mp4 |
109.76Мб |
013 - 2.4 Reporting and Communicating Audit Results.mp4 |
132.22Мб |
014 - 2.5 Audit Evolutions.mp4 |
85.78Мб |
015 - Lesson 2 Review.mp4 |
69.68Мб |
016 - Module Intro.mp4 |
74.96Мб |
017 - Learning objectives.mp4 |
60.12Мб |
018 - 3.1 Understanding Corporate and Information Security Governance (Defining Governance).mp4 |
108.34Мб |
019 - 3.2 Designing Strategic Plans, Policies, and Procedures.mp4 |
145.62Мб |
020 - 3.3 Surveying IT Organizational Structures and SOD.mp4 |
128.13Мб |
021 - 3.4 Surveying Maturity and Process Implementation Models.mp4 |
106.01Мб |
022 - 3.5 Understanding Performance Optimization.mp4 |
112.32Мб |
023 - 3.6 Real-world Auditing IT Governance.mp4 |
189.07Мб |
024 - Lesson 3 Review.mp4 |
76.84Мб |
025 - Learning objectives.mp4 |
46.85Мб |
026 - 4.1 Evaluating a Risk Management Program.mp4 |
107.60Мб |
027 - 4.2 Conducting a Risk Assessment.mp4 |
115.87Мб |
028 - 4.3 Real-world Auditing Risk Management.mp4 |
170.02Мб |
029 - Lesson 4 Review.mp4 |
61.02Мб |
030 - Learning objectives.mp4 |
54.58Мб |
031 - 5.1 Examining Outsourcing and Third-Party Management.mp4 |
124.59Мб |
032 - 5.2 Deconstructing Cloud Computing.mp4 |
152.69Мб |
033 - 5.3 Real-world Auditing Third-Party Relationships.mp4 |
198.03Мб |
034 - Lesson 5 Review.mp4 |
67.72Мб |
035 - Learning objectives.mp4 |
50.11Мб |
036 - 6.1 Defining Business Continuity Planning.mp4 |
107.34Мб |
037 - 6.2 Examining a Business Impact Analysis (BIA).mp4 |
114.01Мб |
038 - 6.3 Designing Business Continuity Plans.mp4 |
129.38Мб |
039 - 6.4 Evaluating Business Continuity Testing and Readiness.mp4 |
182.95Мб |
040 - 6.5 Real-world Auditing Business Continuity.mp4 |
192.36Мб |
041 - Lesson 6 Review.mp4 |
81.28Мб |
042 - Module Intro.mp4 |
74.01Мб |
043 - Learning objectives.mp4 |
54.00Мб |
044 - 7.1 Developing a Business Case.mp4 |
83.00Мб |
045 - 7.2 Understanding Portfolio Management.mp4 |
89.14Мб |
046 - 7.3 Defining Project Management.mp4 |
168.76Мб |
047 - 7.4 Real-world Auditing Portfolio and Project Management.mp4 |
208.02Мб |
048 - Lesson 7 Review.mp4 |
81.08Мб |
049 - Learning objectives.mp4 |
57.19Мб |
050 - 8.1 Exploring Business Application Development.mp4 |
86.84Мб |
051 - 8.2 Identifying Software Development Testing Techniques.mp4 |
124.02Мб |
052 - 8.3 Recognizing Source Code Vulnerabilities.mp4 |
146.82Мб |
053 - 8.4 Real-world Auditing the Development Process.mp4 |
199.85Мб |
054 - Lesson 8 Review.mp4 |
64.33Мб |
055 - Learning objectives.mp4 |
60.86Мб |
056 - 9.1 Exploring Acquisition Processes.mp4 |
77.85Мб |
057 - 9.2 Deconstructing System Implementation.mp4 |
102.96Мб |
058 - 9.3 Recognizing Application Controls.mp4 |
111.04Мб |
059 - 9.4 Understanding Configuration and Change Management.mp4 |
101.76Мб |
060 - 9.5 Real-world Auditing Acquisition and Implementation.mp4 |
235.92Мб |
061 - Lesson 9 Review.mp4 |
66.60Мб |
062 - Module Intro.mp4 |
79.39Мб |
063 - Learning objectives.mp4 |
57.58Мб |
064 - 10.1 Surveying Information Systems Management and Frameworks.mp4 |
105.28Мб |
065 - 10.2 Managing Operational Processes.mp4 |
105.30Мб |
066 - 10.3 Understanding Asset Management.mp4 |
49.91Мб |
067 - 10.4 Real-world Auditing IS Operational Management.mp4 |
196.18Мб |
068 - Lesson 10 Review.mp4 |
47.21Мб |
069 - Learning objectives.mp4 |
49.65Мб |
070 - 11.1 Defining Data Management.mp4 |
78.12Мб |
071 - 11.2 Exploring Database Management Systems (DBMS).mp4 |
156.23Мб |
072 - 11.3 Real-world Auditing Data Management.mp4 |
210.81Мб |
073 - Lesson 11 Review.mp4 |
56.89Мб |
074 - Learning objectives.mp4 |
66.96Мб |
075 - 12.1 Examining OSI and TCP_IP Models.mp4 |
105.98Мб |
076 - 12.2 Exploring Transmission Media and Telecommunications.mp4 |
137.57Мб |
077 - 12.3 Understanding Wireless Networks.mp4 |
138.27Мб |
078 - 12.4 Exploring VoIP.mp4 |
102.90Мб |
079 - 12.5 Real-world Auditing Network Architecture.mp4 |
210.55Мб |
080 - Lesson 12 Review.mp4 |
62.53Мб |
081 - Learning objectives.mp4 |
81.65Мб |
082 - 13.1 Understanding Disaster Reponse and Recovery Objectives.mp4 |
86.91Мб |
083 - 13.2 Identifying Recovery Strategies.mp4 |
110.54Мб |
084 - 13.3 Assessing Backup and Replication Strategies.mp4 |
125.97Мб |
085 - 13.4 Evaluating Disaster Recovery Plan Maintenance.mp4 |
110.30Мб |
086 - 13.5 Real-world Auditing Disaster Response and Recovery.mp4 |
238.58Мб |
087 - Lesson 13 Review.mp4 |
60.08Мб |
088 - Module Intro.mp4 |
97.83Мб |
089 - Learning objectives.mp4 |
61.04Мб |
090 - 14.1 Surveying Information Security Management Systems (ISMS).mp4 |
95.29Мб |
091 - 14.2 Identifying Information Security Classifications and Controls.mp4 |
79.75Мб |
092 - 14.3 Exploring Cyberthreats and Adversaries.mp4 |
152.05Мб |
093 - 14.4 Understanding Incident Management.mp4 |
93.18Мб |
094 - 14.5 Evaluating Investigative and Evidence Handling Capabilities.mp4 |
162.89Мб |
095 - 14.6 Real-world Auditing Information Security Program Management.mp4 |
177.05Мб |
096 - Lesson 14 Review.mp4 |
60.47Мб |
097 - Learning objectives.mp4 |
48.90Мб |
098 - 15.1 Examining Identification and Authentication.mp4 |
96.37Мб |
099 - 15.2 Exploring Access Control.mp4 |
186.18Мб |
100 - 15.3 Monitoring Access.mp4 |
106.62Мб |
101 - 15.4 Real-world Auditing User Access Controls.mp4 |
204.99Мб |
102 - Lesson 15 Review.mp4 |
65.21Мб |
103 - Learning objectives.mp4 |
61.47Мб |
104 - 16.1 Surveying Perimeter Security.mp4 |
185.73Мб |
105 - 16.2 Managing Malware.mp4 |
126.05Мб |
106 - 16.3 Security Endpoint.mp4 |
96.14Мб |
107 - 16.4 Mobile Device Challenges.mp4 |
94.92Мб |
108 - 16.5 Testing Network Infrastructure Security.mp4 |
131.89Мб |
109 - 16.6 Real-world Auditing Infrastructure Security Controls.mp4 |
210.23Мб |
110 - Lesson 16 Review.mp4 |
64.50Мб |
111 - Learning objectives.mp4 |
58.53Мб |
112 - 17.1 Demystifying Encryption.mp4 |
115.83Мб |
113 - 17.2 Applying Asymmetric Encryption.mp4 |
85.08Мб |
114 - 17.3 Examining Hashing and Digital Signatures.mp4 |
99.18Мб |
115 - 17.4 Understanding Digital Certificates.mp4 |
100.04Мб |
116 - 17.5 Identifying Cryptographic Protocols and Attacks.mp4 |
88.05Мб |
117 - 17.6 Real-world Auditing Cryptographic Protocols.mp4 |
207.03Мб |
118 - Lesson 17 Review.mp4 |
67.46Мб |
119 - Learning objectives.mp4 |
57.52Мб |
120 - 18.1 Examining Environmental Threats.mp4 |
86.16Мб |
121 - 18.2 Securing People and Places.mp4 |
78.33Мб |
122 - 18.3 Real-world Auditing Environmental and Physical Access.mp4 |
219.21Мб |
123 - Lesson 18 Review.mp4 |
47.79Мб |
124 - Module Intro.mp4 |
15.78Мб |
125 - Lesson 19 - Understanding the Exam Structure.mp4 |
125.55Мб |
126 - Lesson 20 - Test Taking Strategies.mp4 |
163.14Мб |
127 - Lesson 21 - What to Expect at the Testing Center.mp4 |
132.47Мб |
128 - Lesson 22 - Attaining and Maintaining Your CISA Certification.mp4 |
66.98Мб |
129 - CISA (Certified Information Systems Auditor) - Summary.mp4 |
33.36Мб |