资源总盘
转让成品盘A
转让成品盘B
【荐】网盘目录源码
【+++】创业VIP【+++】
当前目录
全盘搜索
查询全部
查询文件夹
查询文件
信息加载中,请等待...
当前目录:
主页
/
【更新知识库】
/
【03】技能类课程(第一部分)
/
【34】ISACA CISA
01 - CISA Overview.mp4
02 - The Process of Auditing Information Systems.mp4
03 - IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics.mp4
04 - Audit Risk Assessment.mp4
05 - Business Processes.mp4
06 - Control Objectives.mp4
07 - Audit Planning and Management.mp4
08 - Laws and Regulations.mp4
09 - Evidence.mp4
10 - Sampling Methodologies.mp4
11 - Reporting and Communications.mp4
12 - Audit Quality Assurance.mp4
13 - Types of Audits.mp4
14 - Governance and Management of IT.mp4
15 - Information Systems Strategy.mp4
16 - Standards, Governance and Frameworks.mp4
17 - IT Organization.mp4
18 - Legal Compliance.mp4
19 - Enterprise Architecture.mp4
20 - Maintenance of Policies and Procedures.mp4
21 - Maturity Models.mp4
22 - Process Optimization.mp4
23 - IT Investment Strategies.mp4
24 - IT Vendor Selection and Management.mp4
25 - IT Risk Management.mp4
26 - Control Processes.mp4
27 - Quality Management Systems.mp4
28 - IT Performance Monitoring and Reporting.mp4
29 - BCP - Business Impact Analysis.mp4
30 - BCP Maintenance and Testing.mp4
31 - BCP - Invoke and Return to Normal.mp4
32 - Information Systems Acquisition, Development and Implementation.mp4
33 - Benefits Realization.mp4
34 - Vendor Management.mp4
35 - Project Governance.mp4
36 - Project Management.mp4
37 - Risk Management.mp4
38 - Requirements Management.mp4
39 - Application Architecture.mp4
40 - Methodologies.mp4
41 - Control Objectives and Techniques.mp4
42 - Testing.mp4
43 - Configuration and Change Management.mp4
44 - System Migration and Deployment.mp4
45 - Project Success Criteria.mp4
46 - Post-Implementation Reviews.mp4
47 - Information Systems Operations, Maintenance & Support.mp4
48 - Service Level Frameworks.mp4
49 - Service Level Management.mp4
50 - Monitor 3rd Party Compliance.mp4
51 - Architecture.mp4
52 - Computer Hardware, Software and Networks.mp4
53 - Software Resiliency Tools and Techniques.mp4
54 - Software Licensing and Inventory Interfaces.mp4
55 - Managing Schedules.mp4
56 - System Interface Integrity.mp4
57 - Capacity Planning.mp4
58 - Performance Monitoring.mp4
59 - Data Backup.mp4
60 - Database Administration Practices.mp4
61 - Data Quality and Retention.mp4
62 - Problem and Incident Management.mp4
63 - Managing Change to Production Environments.mp4
64 - Risks and Controls for End User Computing.mp4
65 - Disaster Recovery Legal and Contractual Issues.mp4
66 - Business Impact of Disaster Recovery.mp4
67 - Disaster Recovery Plan Maintenance.mp4
68 - Alternate Processing Sites.mp4
69 - Disaster Recovery Testing.mp4
70 - Invoking Disaster Recovery.mp4
71 - Protection of Information Assets.mp4
72 - Information Asset Protection.mp4
73 - Privacy Principles.mp4
74 - Security Controls.mp4
75 - Environmental Protection.mp4
76 - Physical Access Controls.mp4
77 - Logical Access Controls.mp4
78 - Identification and Authentication.mp4
79 - Virtual Systems.mp4
80 - Mobile Devices.mp4
81 - Voice Communication.mp4
82 - Internet Security, Protocols and Techniques.mp4
83 - Network Security Concerns.mp4
84 - Data Encryption.mp4
85 - Public Key Infrastructure.mp4
86 - Peer to Peer Computing.mp4
87 - Data Classification Standards.mp4
88 - Handling Confidential Data.mp4
89 - Data Leakage.mp4
90 - End-User Computing Security.mp4
91 - Security Awareness Program.mp4
92 - Cyber Attacks.mp4
93 - Detection Tools.mp4
94 - Security Testing Techniques.mp4
95 - Security Incidents.mp4
96 - Handling of Evidence.mp4
97 - Fraud Risk Factors.mp4
98 - Passing the Exam.mp4