CBT Nuggets ISACA CISA
视频
|
2017-4-18 23:50
|
2024-12-27 16:37
|
219
|
3.7 GB
|
98
|
- 61 - Computer Hardware, Software and Networks.mp4119.3MB
- 16 - Audit Risk Assessment.mp4105.82MB
- 45 - Project Management.mp496.92MB
- 14 - The Process of Auditing Information Systems.mp483.36MB
- 42 - Information Systems Acquisition, Development and Implementation.mp483.25MB
- 25 - Governance and Management of IT.mp471.74MB
- 52 - Methodologies.mp467.51MB
- 50 - Systems Development Life Cycle (SDLC).mp463.52MB
- 47 - Architecture.mp462.15MB
- 15 - IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics.mp462.12MB
- 01 - CISA Overview.mp460.1MB
- 27 - Information Systems Strategy.mp459.01MB
- 51 - Control Objectives and Techniques.mp458.76MB
- 55 - System Migration and Deployment.mp458.5MB
- 21 - Evidence.mp458.01MB
- 53 - Testing.mp455.33MB
- 62 - Computer Hardware, Software and Networks.mp454.27MB
- 18 - Audit Planning and Management.mp451.9MB
- 26 - Standards, Governance and Frameworks.mp451.33MB
- 17 - Control Objectives.mp449.98MB
- 31 - Legal Compliance.mp449.52MB
- 22 - Sampling Methodologies.mp449.19MB
- 74 - Alternate Processing Sites.mp449.17MB
- 83 - Internet Security, Protocols and Techniques.mp448.91MB
- 44 - Project Governance.mp448.55MB
- 36 - IT Vendor Selection and Management.mp448.21MB
- 37 - IT Risk Management.mp448.09MB
- 64 - Database Administration Practices.mp447.54MB
- 02 - Exam Format.mp447.17MB
- 06 - Audit Standards.mp444.93MB
- 49 - Requirements Management.mp444.18MB
- 77 - Protection of Information Assets.mp443.84MB
- 04 - Passing the Exam.mp442.89MB
- 40 - BCP Business Impact Analysis.mp441.9MB
- 58 - Service Level Management.mp440.91MB
- 71 - Disaster Recovery Legal and Contractual Issues.mp440.48MB
- 09 - Continuous Auditing.mp437.86MB
- 54 - Configuration and Change Management.mp437.51MB
- 13 - Audit Report.mp437.49MB
- 84 - Cyber Attacks.mp437.14MB
- 11 - Legacy Auditing.mp436.94MB
- 46 - Risk Management.mp436.13MB
- 10 - Compensating Controls.mp436.07MB
- 03 - The CISA Review Manual.mp435.89MB
- 07 - Types of Audits.mp435.72MB
- 57 - Information Systems Operations, Maintenance & Support.mp435.38MB
- 97 - Environmental Protection.mp434.82MB
- 08 - Control Self-Assessment.mp434.54MB
- 75 - Invoking Disaster Recovery.mp433.33MB
- 12 - Third Party Auditors.mp432.8MB
- 28 - IT Organization.mp432.53MB
- 38 - IT Performance Monitoring and Reporting.mp432.04MB
- 98 - Handling Confidential Data.mp431.79MB
- 19 - Business Processes.mp431.78MB
- 60 - Managing Schedules.mp431.64MB
- 87 - Security Testing Techniques.mp431.19MB
- 43 - Benefits Realization.mp430.89MB
- 48 - Vendor Management.mp430.76MB
- 39 - BCP HR Policies.mp429.96MB
- 35 - IT Investment Practices.mp429.92MB
- 78 - Security Controls.mp429.52MB
- 90 - Public Key Infrastructure.mp429.26MB
- 23 - Reporting and Communications.mp428.93MB
- 33 - Maturity Models.mp428.92MB
- 73 - Disaster Recovery Plan Maintenance.mp428.53MB
- 68 - Problem and Incident Management.mp428.35MB
- 70 - Data Backup.mp428.24MB
- 96 - Physical Access Controls.mp428.09MB
- 05 - What does a CISA Auditor do.mp427.55MB
- 91 - Peer to Peer Computing.mp426.97MB
- 30 - Enterprise Architecture.mp425.85MB
- 94 - Handling of Evidence.mp425.64MB
- 93 - Voice Communication.mp425.38MB
- 85 - Detection Tools.mp425.22MB
- 65 - Software Resiliency Tools and Techniques.mp424.87MB
- 82 - Network Security Concerns.mp424.34MB
- 59 - Monitor 3rd Party Compliance.mp424.24MB
- 56 - Post Implementation Reviews.mp423.83MB
- 66 - Capacity Planning.mp423.37MB
- 95 - Data Classification Standards.mp422.82MB
- 32 - Quality Management Systems.mp422.73MB
- 76 - Disaster Recovery Testing.mp422.35MB
- 86 - Data Leakage.mp422.01MB
- 88 - Data Leakage.mp422.01MB
- 80 - Logical Access Controls.mp420.54MB
- 41 - BCP Maintenance and Testing.mp420.5MB
- 69 - Managing Change to Production Environments.mp420.25MB
- 34 - Process Optimization.mp419.97MB
- 20 - Laws and Regulations.mp419.54MB
- 24 - Audit Quality Assurance.mp419.43MB
- 92 - Mobile Devices.mp419.22MB
- 63 - Software Licensing and Inventory Interfaces.mp418.58MB
- 81 - Identification and Authentication.mp417.22MB
- 67 - Performance Monitoring.mp416.52MB
- 89 - Data Encryption.mp415.74MB
- 79 - Security Incidents.mp415.72MB
- 29 - Maintenance of Policies and Procedures.mp415.19MB
- 72 - Business Impact of Disaster Recovery.mp411.65MB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统