ISACA CISA内容包含98个文件,包含高清视频以及相关资料,共计:2.65G,通过百度网盘下载保存,支持在线观看或下载保存。
文件列表:
01-CISAOverview.mp4[30.53M]
02-TheProcessofAuditingInformationSystems.mp4[44.85M]
03-ITAuditStandards,Guidelines,ToolsandTechniques,andCodeofEthics.mp4[40.26M]
04-AuditRiskAssessment.mp4[64.84M]
05-BusinessProcesses.mp4[23.66M]
06-ControlObjectives.mp4[33.68M]
07-AuditPlanningandManagement.mp4[38.34M]
08-LawsandRegulations.mp4[15.66M]
09-Evidence.mp4[45.91M]
10-SamplingMethodologies.mp4[37.52M]
11-ReportingandCommunications.mp4[21.84M]
12-AuditQualityAssurance.mp4[12.84M]
13-TypesofAudits.mp4[23.58M]
14-GovernanceandManagementofIT.mp4[33.80M]
15-InformationSystemsStrategy.mp4[42.15M]
16-Standards,GovernanceandFrameworks.mp4[36.76M]
17-ITOrganization.mp4[24.34M]
18-LegalCompliance.mp4[34.41M]
19-EnterpriseArchitecture.mp4[19.98M]
20-MaintenanceofPoliciesandProcedures.mp4[11.59M]
21-MaturityModels.mp4[22.85M]
22-ProcessOptimization.mp4[15.83M]
23-ITInvestmentStrategies.mp4[21.74M]
24-ITVendorSelectionandManagement.mp4[35.94M]
25-ITRiskManagement.mp4[34.15M]
26-ControlProcesses.mp4[17.12M]
27-QualityManagementSystems.mp4[16.48M]
28-ITPerformanceMonitoringandReporting.mp4[24.97M]
29-BCP-BusinessImpactAnalysis.mp4[33.05M]
30-BCPMaintenanceandTesting.mp4[14.47M]
31-BCP-InvokeandReturntoNormal.mp4[31.13M]
32-InformationSystemsAcquisition,DevelopmentandImplementation.mp4[40.49M]
33-BenefitsRealization.mp4[20.51M]
34-VendorManagement.mp4[31.71M]
35-ProjectGovernance.mp4[37.65M]
36-ProjectManagement.mp4[70.51M]
37-RiskManagement.mp4[24.07M]
38-RequirementsManagement.mp4[32.22M]
39-ApplicationArchitecture.mp4[22.15M]
40-Methodologies.mp4[50.73M]
41-ControlObjectivesandTechniques.mp4[45.07M]
42-Testing.mp4[42.28M]
43-ConfigurationandChangeManagement.mp4[28.00M]
44-SystemMigrationandDeployment.mp4[43.62M]
45-ProjectSuccessCriteria.mp4[20.42M]
46-Post-ImplementationReviews.mp4[19.11M]
47-InformationSystemsOperations,Maintenance&Support.mp4[33.73M]
48-ServiceLevelFrameworks.mp4[25.77M]
49-ServiceLevelManagement.mp4[30.47M]
50-Monitor3rdPartyCompliance.mp4[18.54M]
51-Architecture.mp4[47.23M]
52-ComputerHardware,SoftwareandNetworks.mp4[91.99M]
53-SoftwareResiliencyToolsandTechniques.mp4[19.70M]
54-SoftwareLicensingandInventoryInterfaces.mp4[14.74M]
55-ManagingSchedules.mp4[24.72M]
56-SystemInterfaceIntegrity.mp4[43.07M]
57-CapacityPlanning.mp4[18.34M]
58-PerformanceMonitoring.mp4[12.94M]
59-DataBackup.mp4[22.48M]
60-DatabaseAdministrationPractices.mp4[37.30M]
61-DataQualityandRetention.mp4[26.49M]
62-ProblemandIncidentManagement.mp4[22.37M]
63-ManagingChangetoProductionEnvironments.mp4[15.47M]
64-RisksandControlsforEndUserComputing.mp4[25.30M]
65-DisasterRecoveryLegalandContractualIssues.mp4[32.05M]
66-BusinessImpactofDisasterRecovery.mp4[9.06M]
67-DisasterRecoveryPlanMaintenance.mp4[22.24M]
68-AlternateProcessingSites.mp4[38.17M]
69-DisasterRecoveryTesting.mp4[16.89M]
70-InvokingDisasterRecovery.mp4[26.45M]
71-ProtectionofInformationAssets.mp4[33.11M]
72-InformationAssetProtection.mp4[18.62M]
73-PrivacyPrinciples.mp4[27.03M]
74-SecurityControls.mp4[22.93M]
75-EnvironmentalProtection.mp4[27.62M]
76-PhysicalAccessControls.mp4[21.24M]
77-LogicalAccessControls.mp4[16.08M]
78-IdentificationandAuthentication.mp4[13.60M]
79-VirtualSystems.mp4[22.82M]
80-MobileDevices.mp4[14.93M]
81-VoiceCommunication.mp4[19.97M]
82-InternetSecurity,ProtocolsandTechniques.mp4[38.49M]
83-NetworkSecurityConcerns.mp4[19.00M]
84-DataEncryption.mp4[12.36M]
85-PublicKeyInfrastructure.mp4[21.21M]
86-PeertoPeerComputing.mp4[20.83M]
87-DataClassificationStandards.mp4[16.75M]
88-HandlingConfidentialData.mp4[18.09M]
89-DataLeakage.mp4[17.16M]
90-End-UserComputingSecurity.mp4[22.14M]
91-SecurityAwarenessProgram.mp4[17.39M]
92-CyberAttacks.mp4[29.52M]
93-DetectionTools.mp4[19.56M]
94-SecurityTestingTechniques.mp4[24.59M]
95-SecurityIncidents.mp4[12.32M]
96-HandlingofEvidence.mp4[19.94M]
97-FraudRiskFactors.mp4[25.40M]
98-PassingtheExam.mp4[30.78M]
评论0