وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

The Ultimate CISA Journey

سرفصل های دوره

Comprehensive CISA Exam Prep with Real-World Scenarios


1 - Introduction
  • 1 - Introduction

  • 2 - Domain 1 Information System Auditing Process
  • 2 - What is IS Audit
  • 3 - Audit Universe
  • 4 - Controls
  • 5 - Controls and it Types
  • 6 - IT Standards Polices and Procedures
  • 7 - IS Auditors Roles and Responsibilities
  • 8 - Process of IS Audit
  • 9 - Planning an IS Audit
  • 10 - Developing an IS Audit Plan
  • 11 - Follow up on IS Audit
  • 12 - Water Marking
  • 13 - Control Self Assessment CSA
  • 14 - Electronic Data Interchange EDI
  • 15 - Evidence and Fraud Detection
  • 16 - CAATs
  • 17 - CAATs VS Auditor
  • 18 - Audit Charter
  • 19 - Types of Risk
  • 20 - What is Risk
  • 21 - Managing IS Audit
  • 22 - IS Audit Life Cycle

  • 3 - Domain 2 Governance and Management of IT
  • 23 - Introduction
  • 24 - Governance and Management of IT
  • 25 - What is Governance
  • 26 - IT Governance
  • 27 - Governance vs Management
  • 28 - IT Frameworks
  • 29 - Organisational Structure
  • 30 - IT Resource Management
  • 31 - Control Identification
  • 32 - Technical Controls
  • 33 - Administrative Controls
  • 34 - IT Performance Management
  • 35 - IT Service Provider Acquisition and Management
  • 36 - IT Performance and Reporting
  • 37 - Quality Assurance And Management
  • 38 - Business Feasibility Analysis
  • 39 - System Development Methodologies
  • 40 - ERM
  • 41 - Auditors Role
  • 42 - SoD
  • 43 - Closing the Right Supplier
  • 44 - BPR

  • 4 - Domain 3 IS Acquisition Development and Implementation
  • 3 - Domain 3 Final Assessment.html
  • 45 - Information System Aquisition Development Implementation
  • 46 - Project Governance and Management
  • 47 - Feasibility Analysis
  • 48 - Business Case Analysis
  • 49 - System Development Methodologies
  • 50 - Information System Aquisition
  • 51 - Planning Phase ISADI
  • 52 - Acquisition Phase ISADI
  • 53 - Control Identification
  • 54 - Control Design
  • 55 - Access Control
  • 56 - Application Controls
  • 57 - Configuration Management
  • 58 - System Migration
  • 59 - Release Management
  • 60 - Development Phase ISADI
  • 61 - Maturity Model
  • 62 - Implementation Phase ISADI
  • 63 - Post Implementation Review PIR
  • 64 - Conclusion

  • 5 - Domain 4 IS Operations Business Resilience
  • 65 - What to expect
  • 66 - Common Technologies and Architecture
  • 67 - End User Computing
  • 68 - Data Governance
  • 69 - Data Conversion
  • 70 - Problem Incident Management
  • 71 - Change Configuration Release and Patch Management
  • 72 - IT Service Level Management SLM
  • 73 - Database Management
  • 74 - Business Resilience
  • 75 - System Resilience
  • 76 - Business Impact analysis BIA
  • 77 - Disaster Recovery Plan DRP
  • 78 - BCP
  • 79 - IS Operations
  • 80 - Data Backup Storage and Restore
  • 81 - Automation
  • 82 - System Performance Management
  • 83 - IT Management
  • 84 - Clusters
  • 85 - ClientServer Architecture
  • 86 - Protocols
  • 87 - RAID
  • 88 - RPO vs RTO
  • 89 - EMI and Attenuation
  • 90 - Capacity Management

  • 6 - Domain 5 Protection of Information Assets
  • 91 - Introduction
  • 92 - INFORMATION ASSET SECURITY FRAMEWORKS STANDARDS AND GUIDLINES
  • 93 - Identity Access Management IAM
  • 94 - Network End Point Security
  • 95 - Data Classification
  • 96 - Encryption And Related Techniques
  • 97 - Public Key Infrastructure PKI
  • 98 - Web Based Communication Technologies
  • 99 - Virtualization Environment
  • 100 - Security Event Management SEM
  • 101 - Security Awareness Training
  • 102 - IS Attack Methodologies and Techniques
  • 103 - Security Tools and Techniques
  • 104 - Evidence Collection and Forensics
  • 105 - Dead man doors
  • 106 - Biometrics
  • 107 - SSO and Kerberos
  • 108 - Asymmetric Key Encryption
  • 109 - Symmetric Key Encryption
  • 110 - OSI Model
  • 111 - Data Classification
  • 112 - VoIP
  • 113 - BOMBS
  • 114 - XSS Parameter Tampering and Spear Phishing
  • 115 - Sateful Firewall
  • 116 - Pen Testing
  • 117 - Forensics
  • 118 - INFORMATION ASSET SECURITY AND CONTORLS
  • 119 - PRIVACY PRINCIPLE

  • 7 - Final Assessment
    139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 27832
    حجم: 1242 مگابایت
    مدت زمان: 321 دقیقه
    تاریخ انتشار: 29 آذر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید