وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

CISA (Certified Information Systems Auditor)

سرفصل های دوره

Introduction
  • 001. CISA (Certified Information Systems Auditor) Introduction

  • Lesson 1 Audit Fundamentals
  • 001. Learning objectives
  • 002. 1.1 Understanding the Audit Function
  • 003. 1.2 Adhering to ISACA IS Audit and Assurance Standards and Guidelines
  • 004. 1.3 Identifying the Risk Audit Relationship
  • 005. 1.4 Surveying IS Controls
  • 006. Lesson 1 Review

  • Lesson 2 Auditing
  • 001. Learning objectives
  • 002. 2.1 Performing an IS Audit
  • 003. 2.2 Gathering Audit Evidence
  • 004. 2.3 Understanding Sampling Techniques
  • 005. 2.4 Reporting and Communicating Audit Results
  • 006. 2.5 Audit Evolutions
  • 007. Lesson 2 Review

  • Lesson 3 Governance Structure, Processes, and Models
  • 001. Learning objectives
  • 002. 3.1 Understanding Corporate and Information Security Governance (Defining Governance)
  • 003. 3.2 Designing Strategic Plans, Policies, and Procedures
  • 004. 3.3 Surveying IT Organizational Structures and SOD
  • 005. 3.4 Surveying Maturity and Process Implementation Models
  • 006. 3.5 Understanding Performance Optimization
  • 007. 3.6 Real-world Auditing IT Governance
  • 008. Lesson 3 Review

  • Lesson 4 Risk Management
  • 001. Learning objectives
  • 002. 4.1 Evaluating a Risk Management Program
  • 003. 4.2 Conducting a Risk Assessment
  • 004. 4.3 Real-world Auditing Risk Management
  • 005. Lesson 4 Review

  • Lesson 5 Third-Party Relationships
  • 001. Learning objectives
  • 002. 5.1 Examining Outsourcing and Third-Party Management
  • 003. 5.2 Deconstructing Cloud Computing
  • 004. 5.3 Real-world Auditing Third-Party Relationships
  • 005. Lesson 5 Review

  • Lesson 6 Business Continuity
  • 001. Learning objectives
  • 002. 6.1 Defining Business Continuity Planning
  • 003. 6.2 Examining a Business Impact Analysis (BIA)
  • 004. 6.3 Designing Business Continuity Plans
  • 005. 6.4 Evaluating Business Continuity Testing and Readiness
  • 006. 6.5 Real-world Auditing Business Continuity
  • 007. Lesson 6 Review

  • Lesson 7 Project Management
  • 001. Learning objectives
  • 002. 7.1 Developing a Business Case
  • 003. 7.2 Understanding Portfolio Management
  • 004. 7.3 Defining Project Management
  • 005. 7.4 Real-world Auditing Portfolio and Project Management
  • 006. Lesson 7 Review

  • Lesson 8 Application Development
  • 001. Learning objectives
  • 002. 8.1 Exploring Business Application Development
  • 003. 8.2 Identifying Software Development Testing Techniques
  • 004. 8.3 Recognizing Source Code Vulnerabilities
  • 005. 8.4 Real-world Auditing the Development Process
  • 006. Lesson 8 Review

  • Lesson 9 System Acquisition and Implementation
  • 001. Learning objectives
  • 002. 9.1 Exploring Acquisition Processes
  • 003. 9.2 Deconstructing System Implementation
  • 004. 9.3 Recognizing Application Controls
  • 005. 9.4 Understanding Configuration and Change Management
  • 006. 9.5 Real-world Auditing Acquisition and Implementation
  • 007. Lesson 9 Review

  • Lesson 10 IS Operational Management
  • 001. Learning objectives
  • 002. 10.1 Surveying Information Systems Management and Frameworks
  • 003. 10.2 Managing Operational Processes
  • 004. 10.3 Understanding Asset Management
  • 005. 10.4 Real-world Auditing IS Operational Management
  • 006. Lesson 10 Review

  • Lesson 11 Data Management
  • 001. Learning objectives
  • 002. 11.1 Defining Data Management
  • 003. 11.2 Exploring Database Management Systems (DBMS)
  • 004. 11.3 Real-world Auditing Data Management
  • 005. Lesson 11 Review

  • Lesson 12 Network Architecture
  • 001. Learning objectives
  • 002. 12.1 Examining OSI and TCPIP Models
  • 003. 12.2 Exploring Transmission Media and Telecommunications
  • 004. 12.3 Understanding Wireless Networks
  • 005. 12.4 Exploring VoIP
  • 006. 12.5 Real-world Auditing Network Architecture
  • 007. Lesson 12 Review

  • Lesson 13 Disaster Response and Recovery
  • 001. Learning objectives
  • 002. 13.1 Understanding Disaster Reponse and Recovery Objectives
  • 003. 13.2 Identifying Recovery Strategies
  • 004. 13.3 Assessing Backup and Replication Strategies
  • 005. 13.4 Evaluating Disaster Recovery Plan Maintenance
  • 006. 13.5 Real-world Auditing Disaster Response and Recovery
  • 007. Lesson 13 Review

  • Lesson 14 Information Security Program Management
  • 001. Learning objectives
  • 002. 14.1 Surveying Information Security Management Systems (ISMS)
  • 003. 14.2 Identifying Information Security Classifications and Controls
  • 004. 14.3 Exploring Cyberthreats and Adversaries
  • 005. 14.4 Understanding Incident Management
  • 006. 14.5 Evaluating Investigative and Evidence Handling Capabilities
  • 007. 14.6 Real-world Auditing Information Security Program Management
  • 008. Lesson 14 Review

  • Lesson 15 Authentication and Authorization
  • 001. Learning objectives
  • 002. 15.1 Examining Identification and Authentication
  • 003. 15.2 Exploring Access Control
  • 004. 15.3 Monitoring Access
  • 005. 15.4 Real-world Auditing User Access Controls
  • 006. Lesson 15 Review

  • Lesson 16 Infrastructure Security
  • 001. Learning objectives
  • 002. 16.1 Surveying Perimeter Security
  • 003. 16.2 Managing Malware
  • 004. 16.3 Security Endpoint
  • 005. 16.4 Mobile Device Challenges
  • 006. 16.5 Testing Network Infrastructure Security
  • 007. 16.6 Real-world Auditing Infrastructure Security Controls
  • 008. Lesson 16 Review

  • Lesson 17 Cryptography
  • 001. Learning objectives
  • 002. 17.1 Demystifying Encryption
  • 003. 17.2 Applying Asymmetric Encryption
  • 004. 17.3 Examining Hashing and Digital Signatures
  • 005. 17.4 Understanding Digital Certificates
  • 006. 17.5 Identifying Cryptographic Protocols and Attacks
  • 007. 17.6 Real-world Auditing Cryptographic Protocols
  • 008. Lesson 17 Review

  • Lesson 18 Physical and Environmental Security
  • 001. Learning objectives
  • 002. 18.1 Examining Environmental Threats
  • 003. 18.2 Securing People and Places
  • 004. 18.3 Real-world Auditing Environmental and Physical Access
  • 005. Lesson 18 Review

  • Module 1 The Process of Auditing Information Systems
  • 001. Module Intro

  • Module 2 Governance and Management of IT
  • 001. Module Intro

  • Module 3 Information Systems Acquisition, Development, and Implementation
  • 001. Module Intro

  • Module 4 Information Systems Operations, Maintenance, and Service Management
  • 001. Module Intro

  • Module 5 Protection of Information Assets
  • 001. Module Intro

  • Module 6 Acing Your Exam
  • 001. Module Intro
  • 002. Lesson 19 Understanding the Exam Structure
  • 003. Lesson 20 Test Taking Strategies
  • 004. Lesson 21 What to Expect at the Testing Center
  • 005. Lesson 22 Attaining and Maintaining Your CISA Certification

  • Summary
  • 001. CISA (Certified Information Systems Auditor) Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 14230
    حجم: 4325 مگابایت
    مدت زمان: 738 دقیقه
    تاریخ انتشار: ۲۹ خرداد ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید