搜索
[ DevCourseWeb.com ] Udemy - Information Systems Auditor (2022)
磁力链接/BT种子名称
[ DevCourseWeb.com ] Udemy - Information Systems Auditor (2022)
磁力链接/BT种子简介
种子哈希:
f36bd726626ea8d86944ccb6989f28ac9f48968d
文件大小:
1.73G
已经下载:
1080
次
下载速度:
极快
收录时间:
2022-04-25
最近下载:
2025-12-04
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:F36BD726626EA8D86944CCB6989F28AC9F48968D
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
deeper.25.01.02.
大神套路学生妹子
直播
tigerr,benson
撸管+清纯
tigerr,benson,tentacles
兽交
职场艳遇
门事件
katrina.jade
白丝
juvr-264
holly-model
洁已
cs.
森日向子
精液收集
推特地雷系少萝#凄+付费订阅病娇脸第五人格cos自慰合集
stockcarman
新流出安防酒店偷拍 精品高颜值美女进门就被猴急男友脱光光玩逼暴力操大声呻吟
ssis-145-uc
elsbeth
麻豆av
md-0260
txq fiction
petits
adobe+dc
dasd-091
dass-366
小北探花
文件列表
~Get Your Files Here !/1. The IS Audit Process/11. Assessing Countermeasures.mp4
50.3 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/22. Infrastructure Development and Acquisition.mp4
48.9 MB
~Get Your Files Here !/1. The IS Audit Process/10. Risk Analysis Defined.mp4
39.4 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/10. VPN Defined.mp4
38.8 MB
~Get Your Files Here !/2. Governance and Management of IT/21. Information Security Policy Document.mp4
38.5 MB
~Get Your Files Here !/1. The IS Audit Process/8. Audit Planning Process.mp4
34.8 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/3. Project Management Structure.mp4
34.7 MB
~Get Your Files Here !/1. The IS Audit Process/15. Internal Controls Objectives & Procedures.mp4
34.4 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/4. Project Management Structure.mp4
27.8 MB
~Get Your Files Here !/5. Protection of Information Assets/33. Computer Forensics.mp4
27.1 MB
~Get Your Files Here !/2. Governance and Management of IT/35. Insourcing and Outsourcing Strategy.mp4
26.9 MB
~Get Your Files Here !/5. Protection of Information Assets/14. Identification and Authentication Mechanisms.mp4
26.7 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/11. Traditional SDLC Approach.mp4
26.3 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/25. Hardware Software Acquisition.mp4
25.8 MB
~Get Your Files Here !/2. Governance and Management of IT/41. Performance Management.mp4
25.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/9. Network Topology.mp4
25.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/8. Network Types.mp4
24.9 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/15. Agile Development.mp4
24.2 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/5. Example Organizational Chart.mp4
24.2 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/15. BCPDR - 7 Steps to Recovery.mp4
23.8 MB
~Get Your Files Here !/5. Protection of Information Assets/15. Strong Password Policy.mp4
22.2 MB
~Get Your Files Here !/5. Protection of Information Assets/9. Exposures and Vulnerabilities.mp4
22.0 MB
~Get Your Files Here !/2. Governance and Management of IT/33. Sourcing IS Functions.mp4
21.8 MB
~Get Your Files Here !/1. The IS Audit Process/4. Types of Auditors.mp4
20.9 MB
~Get Your Files Here !/5. Protection of Information Assets/20. Client-Server Security.mp4
20.6 MB
~Get Your Files Here !/5. Protection of Information Assets/27. Symmetric vs. Asymmetric.mp4
20.3 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/12. Software Development Risks.mp4
19.6 MB
~Get Your Files Here !/2. Governance and Management of IT/19. Policies.mp4
19.1 MB
~Get Your Files Here !/2. Governance and Management of IT/12. Information Security Governance.mp4
18.9 MB
~Get Your Files Here !/2. Governance and Management of IT/8. Role of Auditor.mp4
18.9 MB
~Get Your Files Here !/2. Governance and Management of IT/25. Procedures.mp4
18.5 MB
~Get Your Files Here !/2. Governance and Management of IT/27. Risk Management - Approaches.mp4
18.0 MB
~Get Your Files Here !/2. Governance and Management of IT/37. Change Management.mp4
17.7 MB
~Get Your Files Here !/5. Protection of Information Assets/25. Encryption Mechanisms.mp4
16.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/30. BCP Components.mp4
16.0 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/17. Business Impact Analysis - BIA.mp4
15.9 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/24. Facilities, Materials, and Supplies.mp4
15.6 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/6. Practical Project Management.mp4
15.2 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/18. RPO and RTO.mp4
15.2 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/4. Advantages of Reference Models.mp4
15.1 MB
~Get Your Files Here !/2. Governance and Management of IT/32. Personnel Management.mp4
14.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/14. Definitions.mp4
14.7 MB
~Get Your Files Here !/1. The IS Audit Process/16. Internal Control Types.mp4
14.4 MB
~Get Your Files Here !/5. Protection of Information Assets/17. Authorization.mp4
14.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/11. Wireless Specifications.mp4
14.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/19. Recovery Strategies.mp4
14.0 MB
~Get Your Files Here !/1. The IS Audit Process/27. Phases of the Audit Process (Page 2).mp4
13.7 MB
~Get Your Files Here !/2. Governance and Management of IT/20. Policies.mp4
13.5 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/26. Data Recovery.mp4
13.4 MB
~Get Your Files Here !/5. Protection of Information Assets/31. Penetration Testing.mp4
13.0 MB
~Get Your Files Here !/2. Governance and Management of IT/39. Quality Management.mp4
12.7 MB
~Get Your Files Here !/2. Governance and Management of IT/40. Organizational Quality Management.mp4
12.2 MB
~Get Your Files Here !/2. Governance and Management of IT/4. IT Governance.mp4
12.1 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/35. Chapter 3 Review.mp4
11.6 MB
~Get Your Files Here !/5. Protection of Information Assets/21. Firewall.mp4
11.6 MB
~Get Your Files Here !/2. Governance and Management of IT/13. Information Security Governance.mp4
11.5 MB
~Get Your Files Here !/5. Protection of Information Assets/16. Identification and Authentication Mechanisms.mp4
11.4 MB
~Get Your Files Here !/2. Governance and Management of IT/43. Chapter 2 Review.mp4
11.4 MB
~Get Your Files Here !/2. Governance and Management of IT/31. IS Management Practices.mp4
11.3 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/22. Categories of Recovery Strategies.mp4
11.2 MB
~Get Your Files Here !/2. Governance and Management of IT/42. Organizational Quality Management.mp4
11.1 MB
~Get Your Files Here !/2. Governance and Management of IT/3. IT Governance.mp4
10.9 MB
~Get Your Files Here !/1. The IS Audit Process/7. The Auditing Process.mp4
10.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/34. Types of BCPDR Testing Strategies.mp4
10.6 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/23. Analysis of Physical Infrastructures.mp4
10.6 MB
~Get Your Files Here !/1. The IS Audit Process/3. Definitions.mp4
10.4 MB
~Get Your Files Here !/2. Governance and Management of IT/38. Organizational Quality Management.mp4
10.2 MB
~Get Your Files Here !/1. The IS Audit Process/22. General Control MethodsTypes.mp4
10.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/31. R.A.I.D..mp4
10.1 MB
~Get Your Files Here !/5. Protection of Information Assets/3. Key Elements, Roles, and Responsibilities.mp4
10.0 MB
~Get Your Files Here !/2. Governance and Management of IT/23. Management Reviews.mp4
9.9 MB
~Get Your Files Here !/1. The IS Audit Process/13. Motivations for Risk Analysis.mp4
9.5 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/28. Disaster Recovery Plan (DRP) Development.mp4
9.5 MB
~Get Your Files Here !/1. The IS Audit Process/19. Internal Controls (Corrective).mp4
9.4 MB
~Get Your Files Here !/1. The IS Audit Process/25. Audit Classifications.mp4
9.1 MB
~Get Your Files Here !/5. Protection of Information Assets/18. Dealing with Data.mp4
9.1 MB
~Get Your Files Here !/5. Protection of Information Assets/11. Exposures and Vulnerabilities.mp4
8.9 MB
~Get Your Files Here !/1. The IS Audit Process/21. Goals of Internal Controls.mp4
8.8 MB
~Get Your Files Here !/5. Protection of Information Assets/4. Key Elements, Roles, and Responsibilities.mp4
8.8 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/29. Application Controls.mp4
8.8 MB
~Get Your Files Here !/5. Protection of Information Assets/8. 4 Categories of Attacks.mp4
8.6 MB
~Get Your Files Here !/5. Protection of Information Assets/29. Auditing IS Management Framework.mp4
8.4 MB
~Get Your Files Here !/2. Governance and Management of IT/10. Practices & Procedures.mp4
8.2 MB
~Get Your Files Here !/2. Governance and Management of IT/36. Change Management.mp4
8.1 MB
~Get Your Files Here !/2. Governance and Management of IT/34. Insourcing and Outsourcing Strategy.mp4
8.0 MB
~Get Your Files Here !/2. Governance and Management of IT/11. Information Security Governance.mp4
7.9 MB
~Get Your Files Here !/2. Governance and Management of IT/22. Information Security Policy Document.mp4
7.7 MB
~Get Your Files Here !/5. Protection of Information Assets/5. Classifying Information Assets.mp4
7.7 MB
~Get Your Files Here !/2. Governance and Management of IT/26. Procedures.mp4
7.6 MB
~Get Your Files Here !/2. Governance and Management of IT/7. Role of Auditor.mp4
7.5 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/7. Practical Project Management – 5 Steps.mp4
7.5 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/18. R.A.D. – Rapid Application Deployment.mp4
7.4 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/1. IS Operations, Maintenance, and Support.mp4
7.3 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/9. Business Application Development.mp4
7.0 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/31. Input Controls.mp4
6.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/23. Business Recovery.mp4
6.6 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/34. Output Controls.mp4
6.6 MB
~Get Your Files Here !/5. Protection of Information Assets/22. Intrusion Prevention Service (IPS).mp4
6.6 MB
~Get Your Files Here !/1. The IS Audit Process/30. Evidence.mp4
6.6 MB
~Get Your Files Here !/1. The IS Audit Process/6. The Auditing Process.mp4
6.6 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/30. Auditor Tasks.mp4
6.5 MB
~Get Your Files Here !/2. Governance and Management of IT/5. Governance Defined.mp4
6.4 MB
~Get Your Files Here !/5. Protection of Information Assets/30. Auditing Logical Access.mp4
6.3 MB
~Get Your Files Here !/1. The IS Audit Process/33. Control Self-Assessment (CSA).mp4
6.2 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/20. Other Alternative Development Methods.mp4
6.2 MB
~Get Your Files Here !/1. The IS Audit Process/12. Steps of Assessment.mp4
6.1 MB
~Get Your Files Here !/5. Protection of Information Assets/23. Honeypot (HP).mp4
6.0 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/29. BCP & DR - Teams.mp4
5.7 MB
~Get Your Files Here !/1. The IS Audit Process/20. Goals of Internal Controls.mp4
5.7 MB
~Get Your Files Here !/1. The IS Audit Process/29. A Risk-Based Audit Approach.mp4
5.5 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/13. BCPDR.mp4
5.3 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/1. IS Operations and Business Resilience.mp4
5.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/6. Reliability.mp4
4.9 MB
~Get Your Files Here !/5. Protection of Information Assets/26. Encryption Mechanisms.mp4
4.8 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/10. Business Application Development.mp4
4.8 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/17. Prototyping.mp4
4.7 MB
~Get Your Files Here !/5. Protection of Information Assets/34. Chapter 5 Review.mp4
4.5 MB
~Get Your Files Here !/2. Governance and Management of IT/16. Goals of Security Governance.mp4
4.5 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/24. 4 Steps to Planning Infrastructure Implementation.mp4
4.5 MB
~Get Your Files Here !/2. Governance and Management of IT/9. Practices & Procedures.mp4
4.4 MB
~Get Your Files Here !/5. Protection of Information Assets/6. System Access Permission.mp4
4.4 MB
~Get Your Files Here !/1. The IS Audit Process/5. The Auditing Process.mp4
4.3 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/36. Business Continuity Management (BCM) Institutes and Organizations.mp4
4.3 MB
~Get Your Files Here !/1. The IS Audit Process/34. Chapter 1 Review.mp4
4.2 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/26. Maintaining Information Systems.mp4
4.1 MB
~Get Your Files Here !/1. The IS Audit Process/31. Evidence Gathering Techniques.mp4
4.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/16. BCPDR Incident Classification.mp4
4.0 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/28. Change Management Standards.mp4
4.0 MB
~Get Your Files Here !/5. Protection of Information Assets/32. Penetration Testing.mp4
4.0 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/38. Chapter 4 Review.mp4
4.0 MB
~Get Your Files Here !/2. Governance and Management of IT/28. Risk Management.mp4
3.9 MB
~Get Your Files Here !/5. Protection of Information Assets/19. LAN Security.mp4
3.9 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/32. Insurance.mp4
3.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/33. Business Continuity Plan (BCP) Testing.mp4
3.8 MB
~Get Your Files Here !/1. The IS Audit Process/1. The IS Audit Process.mp4
3.8 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/16. Prototyping.mp4
3.7 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/3. Networking Models.mp4
3.6 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/13. Alternative Development Methods.mp4
3.3 MB
~Get Your Files Here !/1. The IS Audit Process/18. Internal Controls (Detective).mp4
3.3 MB
~Get Your Files Here !/2. Governance and Management of IT/1. Governance and Management of IT.mp4
3.3 MB
~Get Your Files Here !/1. The IS Audit Process/26. Phases of the Audit Process (Page 1).mp4
3.3 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/35. Auditing BCPDR.mp4
3.3 MB
~Get Your Files Here !/5. Protection of Information Assets/1. Protection of Information Assets.mp4
3.3 MB
~Get Your Files Here !/5. Protection of Information Assets/13. Logical Access Paths.mp4
3.2 MB
~Get Your Files Here !/1. The IS Audit Process/23. The IS Audit Process.mp4
3.2 MB
~Get Your Files Here !/2. Governance and Management of IT/6. Relationship Structure.mp4
3.1 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/37. Business Continuity Management (BCM).mp4
3.0 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/32. Data Validation Checks.mp4
2.9 MB
~Get Your Files Here !/2. Governance and Management of IT/18. IT Governance.mp4
2.9 MB
~Get Your Files Here !/1. The IS Audit Process/24. Audit Classifications.mp4
2.8 MB
~Get Your Files Here !/1. The IS Audit Process/32. Computer Assisted Audit.mp4
2.7 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/27. Change Management Standards.mp4
2.7 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/19. R.A.D. – 4 Stages.mp4
2.6 MB
~Get Your Files Here !/2. Governance and Management of IT/24. Management Reviews.mp4
2.5 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/12. Topic C Business Continuity & Disaster Recovery.mp4
2.4 MB
~Get Your Files Here !/1. The IS Audit Process/17. Internal Controls (Preventative).mp4
2.3 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/5. The OSI Model.mp4
2.2 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/25. Facilities, Materials, and Supplies.mp4
2.2 MB
~Get Your Files Here !/5. Protection of Information Assets/10. Exposures and Vulnerabilities.mp4
2.1 MB
~Get Your Files Here !/1. The IS Audit Process/28. Inherent Risks During Audits.mp4
1.9 MB
~Get Your Files Here !/2. Governance and Management of IT/14. Information Security Governance.mp4
1.8 MB
~Get Your Files Here !/4. IS Operations and Business Resilience/7. Topic B IS Network Infrastructure.mp4
1.6 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/21. Topic C Infrastructure Development and Acquisition.mp4
1.6 MB
~Get Your Files Here !/5. Protection of Information Assets/24. Topic D Encryption.mp4
1.4 MB
~Get Your Files Here !/2. Governance and Management of IT/15. Results of Security Governance.mp4
1.4 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/2. Topic A Project Management.mp4
1.3 MB
~Get Your Files Here !/1. The IS Audit Process/9. Topic B Risk Analysis.mp4
1.1 MB
~Get Your Files Here !/5. Protection of Information Assets/12. Topic C Access Controls.mp4
1.1 MB
~Get Your Files Here !/1. The IS Audit Process/2. Topic A The Auditing Process and Auditors.mp4
1.0 MB
~Get Your Files Here !/2. Governance and Management of IT/17. Topic B Policies, Procedures, and Risk.mp4
1.0 MB
~Get Your Files Here !/2. Governance and Management of IT/29. IT Risk Management - Levels.mp4
1.0 MB
~Get Your Files Here !/1. The IS Audit Process/14. Topic C Internal Controls.mp4
1.0 MB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/14. Alternative Development Methods.mp4
943.0 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/2. Topic A Networking Models.mp4
939.3 kB
~Get Your Files Here !/2. Governance and Management of IT/2. Topic A The Role of Governance.mp4
783.8 kB
~Get Your Files Here !/5. Protection of Information Assets/7. Topic B Threats and Vulnerabilities.mp4
751.8 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/27. Topic E Disaster Recovery.mp4
702.0 kB
~Get Your Files Here !/2. Governance and Management of IT/30. Topic C IT Governance & Personnel Management.mp4
632.5 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/8. Topic B Software Development and Acquisition.mp4
621.3 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/33. Data Validation Checks.mp4
598.8 kB
~Get Your Files Here !/5. Protection of Information Assets/2. Topic A Protecting Data.mp4
472.4 kB
~Get Your Files Here !/5. Protection of Information Assets/28. Topic E Auditing Practices.mp4
311.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/20. Topic D Recovery.mp4
188.3 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/21. Topic D Recovery.mp4
188.3 kB
~Get Your Files Here !/1. The IS Audit Process/11. Assessing Countermeasures.srt
20.8 kB
~Get Your Files Here !/1. The IS Audit Process/8. Audit Planning Process.srt
19.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/9. Network Topology.srt
15.0 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/3. Project Management Structure.srt
14.4 kB
~Get Your Files Here !/2. Governance and Management of IT/35. Insourcing and Outsourcing Strategy.srt
14.4 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/4. Project Management Structure.srt
13.9 kB
~Get Your Files Here !/2. Governance and Management of IT/41. Performance Management.srt
13.6 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/22. Infrastructure Development and Acquisition.srt
13.3 kB
~Get Your Files Here !/1. The IS Audit Process/10. Risk Analysis Defined.srt
12.7 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/25. Hardware Software Acquisition.srt
12.7 kB
~Get Your Files Here !/2. Governance and Management of IT/33. Sourcing IS Functions.srt
12.5 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/8. Network Types.srt
12.2 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/11. Traditional SDLC Approach.srt
11.3 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/5. Example Organizational Chart.srt
10.9 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/10. VPN Defined.srt
10.8 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/15. BCPDR - 7 Steps to Recovery.srt
10.6 kB
~Get Your Files Here !/2. Governance and Management of IT/21. Information Security Policy Document.srt
10.3 kB
~Get Your Files Here !/5. Protection of Information Assets/9. Exposures and Vulnerabilities.srt
10.3 kB
~Get Your Files Here !/5. Protection of Information Assets/14. Identification and Authentication Mechanisms.srt
10.2 kB
~Get Your Files Here !/2. Governance and Management of IT/32. Personnel Management.srt
10.0 kB
~Get Your Files Here !/1. The IS Audit Process/15. Internal Controls Objectives & Procedures.srt
9.2 kB
~Get Your Files Here !/2. Governance and Management of IT/37. Change Management.srt
9.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/19. Recovery Strategies.srt
9.2 kB
~Get Your Files Here !/5. Protection of Information Assets/15. Strong Password Policy.srt
9.1 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/30. BCP Components.srt
8.8 kB
~Get Your Files Here !/5. Protection of Information Assets/27. Symmetric vs. Asymmetric.srt
8.4 kB
~Get Your Files Here !/1. The IS Audit Process/16. Internal Control Types.srt
8.3 kB
~Get Your Files Here !/5. Protection of Information Assets/33. Computer Forensics.srt
8.3 kB
~Get Your Files Here !/5. Protection of Information Assets/20. Client-Server Security.srt
8.1 kB
~Get Your Files Here !/2. Governance and Management of IT/19. Policies.srt
7.9 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/6. Practical Project Management.srt
7.8 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/14. Definitions.srt
7.8 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/12. Software Development Risks.srt
7.7 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/24. Facilities, Materials, and Supplies.srt
7.6 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/18. RPO and RTO.srt
7.4 kB
~Get Your Files Here !/2. Governance and Management of IT/12. Information Security Governance.srt
7.2 kB
~Get Your Files Here !/1. The IS Audit Process/25. Audit Classifications.srt
7.2 kB
~Get Your Files Here !/1. The IS Audit Process/4. Types of Auditors.srt
7.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/22. Categories of Recovery Strategies.srt
7.1 kB
~Get Your Files Here !/2. Governance and Management of IT/25. Procedures.srt
7.1 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/17. Business Impact Analysis - BIA.srt
6.7 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/11. Wireless Specifications.srt
6.6 kB
~Get Your Files Here !/2. Governance and Management of IT/27. Risk Management - Approaches.srt
6.6 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/15. Agile Development.srt
6.5 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/26. Data Recovery.srt
6.4 kB
~Get Your Files Here !/2. Governance and Management of IT/3. IT Governance.srt
6.3 kB
~Get Your Files Here !/2. Governance and Management of IT/20. Policies.srt
6.2 kB
~Get Your Files Here !/2. Governance and Management of IT/8. Role of Auditor.srt
6.1 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/31. R.A.I.D..srt
6.0 kB
~Get Your Files Here !/5. Protection of Information Assets/18. Dealing with Data.srt
6.0 kB
~Get Your Files Here !/2. Governance and Management of IT/39. Quality Management.srt
6.0 kB
~Get Your Files Here !/1. The IS Audit Process/27. Phases of the Audit Process (Page 2).srt
5.8 kB
~Get Your Files Here !/1. The IS Audit Process/7. The Auditing Process.srt
5.8 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/34. Types of BCPDR Testing Strategies.srt
5.7 kB
~Get Your Files Here !/2. Governance and Management of IT/43. Chapter 2 Review.srt
5.7 kB
~Get Your Files Here !/1. The IS Audit Process/3. Definitions.srt
5.6 kB
~Get Your Files Here !/5. Protection of Information Assets/25. Encryption Mechanisms.srt
5.6 kB
~Get Your Files Here !/2. Governance and Management of IT/31. IS Management Practices.srt
5.6 kB
~Get Your Files Here !/2. Governance and Management of IT/4. IT Governance.srt
5.6 kB
~Get Your Files Here !/5. Protection of Information Assets/31. Penetration Testing.srt
5.5 kB
~Get Your Files Here !/5. Protection of Information Assets/8. 4 Categories of Attacks.srt
5.5 kB
~Get Your Files Here !/2. Governance and Management of IT/42. Organizational Quality Management.srt
5.5 kB
~Get Your Files Here !/1. The IS Audit Process/19. Internal Controls (Corrective).srt
5.2 kB
~Get Your Files Here !/5. Protection of Information Assets/17. Authorization.srt
5.1 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/35. Chapter 3 Review.srt
5.0 kB
~Get Your Files Here !/5. Protection of Information Assets/16. Identification and Authentication Mechanisms.srt
4.9 kB
~Get Your Files Here !/5. Protection of Information Assets/21. Firewall.srt
4.6 kB
~Get Your Files Here !/1. The IS Audit Process/13. Motivations for Risk Analysis.srt
4.6 kB
~Get Your Files Here !/2. Governance and Management of IT/13. Information Security Governance.srt
4.6 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/7. Practical Project Management – 5 Steps.srt
4.5 kB
~Get Your Files Here !/2. Governance and Management of IT/40. Organizational Quality Management.srt
4.4 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/31. Input Controls.srt
4.3 kB
~Get Your Files Here !/2. Governance and Management of IT/23. Management Reviews.srt
4.0 kB
~Get Your Files Here !/2. Governance and Management of IT/34. Insourcing and Outsourcing Strategy.srt
4.0 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/13. BCPDR.srt
4.0 kB
~Get Your Files Here !/2. Governance and Management of IT/36. Change Management.srt
3.9 kB
~Get Your Files Here !/5. Protection of Information Assets/11. Exposures and Vulnerabilities.srt
3.9 kB
~Get Your Files Here !/1. The IS Audit Process/22. General Control MethodsTypes.srt
3.8 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/28. Disaster Recovery Plan (DRP) Development.srt
3.8 kB
~Get Your Files Here !/2. Governance and Management of IT/10. Practices & Procedures.srt
3.7 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/9. Business Application Development.srt
3.7 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/23. Analysis of Physical Infrastructures.srt
3.7 kB
~Get Your Files Here !/2. Governance and Management of IT/22. Information Security Policy Document.srt
3.7 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/34. Output Controls.srt
3.6 kB
~Get Your Files Here !/5. Protection of Information Assets/5. Classifying Information Assets.srt
3.5 kB
~Get Your Files Here !/1. The IS Audit Process/12. Steps of Assessment.srt
3.4 kB
~Get Your Files Here !/5. Protection of Information Assets/29. Auditing IS Management Framework.srt
3.4 kB
~Get Your Files Here !/2. Governance and Management of IT/26. Procedures.srt
3.3 kB
~Get Your Files Here !/1. The IS Audit Process/21. Goals of Internal Controls.srt
3.3 kB
~Get Your Files Here !/1. The IS Audit Process/30. Evidence.srt
3.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/16. BCPDR Incident Classification.srt
3.2 kB
~Get Your Files Here !/2. Governance and Management of IT/7. Role of Auditor.srt
3.2 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/1. IS Operations, Maintenance, and Support.srt
3.2 kB
~Get Your Files Here !/5. Protection of Information Assets/4. Key Elements, Roles, and Responsibilities.srt
3.1 kB
~Get Your Files Here !/2. Governance and Management of IT/38. Organizational Quality Management.srt
3.0 kB
~Get Your Files Here !/1. The IS Audit Process/34. Chapter 1 Review.srt
3.0 kB
~Get Your Files Here !/5. Protection of Information Assets/3. Key Elements, Roles, and Responsibilities.srt
2.9 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/4. Advantages of Reference Models.srt
2.9 kB
~Get Your Files Here !/2. Governance and Management of IT/5. Governance Defined.srt
2.9 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/29. Application Controls.srt
2.8 kB
~Get Your Files Here !/1. The IS Audit Process/29. A Risk-Based Audit Approach.srt
2.8 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/20. Other Alternative Development Methods.srt
2.7 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/23. Business Recovery.srt
2.7 kB
~Get Your Files Here !/1. The IS Audit Process/6. The Auditing Process.srt
2.6 kB
~Get Your Files Here !/5. Protection of Information Assets/30. Auditing Logical Access.srt
2.5 kB
~Get Your Files Here !/5. Protection of Information Assets/26. Encryption Mechanisms.srt
2.5 kB
~Get Your Files Here !/1. The IS Audit Process/5. The Auditing Process.srt
2.4 kB
~Get Your Files Here !/2. Governance and Management of IT/11. Information Security Governance.srt
2.4 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/29. BCP & DR - Teams.srt
2.4 kB
~Get Your Files Here !/5. Protection of Information Assets/6. System Access Permission.srt
2.3 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/24. 4 Steps to Planning Infrastructure Implementation.srt
2.3 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/32. Insurance.srt
2.3 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/26. Maintaining Information Systems.srt
2.3 kB
~Get Your Files Here !/5. Protection of Information Assets/34. Chapter 5 Review.srt
2.2 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/18. R.A.D. – Rapid Application Deployment.srt
2.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/35. Auditing BCPDR.srt
2.2 kB
~Get Your Files Here !/5. Protection of Information Assets/22. Intrusion Prevention Service (IPS).srt
2.2 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/30. Auditor Tasks.srt
2.2 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/32. Data Validation Checks.srt
2.1 kB
~Get Your Files Here !/1. The IS Audit Process/1. The IS Audit Process.srt
2.1 kB
~Get Your Files Here !/5. Protection of Information Assets/23. Honeypot (HP).srt
2.1 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/38. Chapter 4 Review.srt
2.1 kB
~Get Your Files Here !/1. The IS Audit Process/23. The IS Audit Process.srt
2.1 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/33. Business Continuity Plan (BCP) Testing.srt
2.0 kB
~Get Your Files Here !/2. Governance and Management of IT/28. Risk Management.srt
1.9 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/1. IS Operations and Business Resilience.srt
1.9 kB
~Get Your Files Here !/5. Protection of Information Assets/32. Penetration Testing.srt
1.9 kB
~Get Your Files Here !/5. Protection of Information Assets/13. Logical Access Paths.srt
1.9 kB
~Get Your Files Here !/2. Governance and Management of IT/18. IT Governance.srt
1.8 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/10. Business Application Development.srt
1.8 kB
~Get Your Files Here !/2. Governance and Management of IT/9. Practices & Procedures.srt
1.8 kB
~Get Your Files Here !/1. The IS Audit Process/20. Goals of Internal Controls.srt
1.7 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/12. Topic C Business Continuity & Disaster Recovery.srt
1.7 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/16. Prototyping.srt
1.7 kB
~Get Your Files Here !/1. The IS Audit Process/33. Control Self-Assessment (CSA).srt
1.7 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/13. Alternative Development Methods.srt
1.7 kB
~Get Your Files Here !/2. Governance and Management of IT/24. Management Reviews.srt
1.7 kB
~Get Your Files Here !/5. Protection of Information Assets/1. Protection of Information Assets.srt
1.7 kB
~Get Your Files Here !/1. The IS Audit Process/31. Evidence Gathering Techniques.srt
1.6 kB
~Get Your Files Here !/1. The IS Audit Process/18. Internal Controls (Detective).srt
1.6 kB
~Get Your Files Here !/5. Protection of Information Assets/10. Exposures and Vulnerabilities.srt
1.6 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/19. R.A.D. – 4 Stages.srt
1.5 kB
~Get Your Files Here !/1. The IS Audit Process/26. Phases of the Audit Process (Page 1).srt
1.5 kB
~Get Your Files Here !/1. The IS Audit Process/28. Inherent Risks During Audits.srt
1.5 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/36. Business Continuity Management (BCM) Institutes and Organizations.srt
1.5 kB
~Get Your Files Here !/5. Protection of Information Assets/19. LAN Security.srt
1.5 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/17. Prototyping.srt
1.5 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/28. Change Management Standards.srt
1.5 kB
~Get Your Files Here !/5. Protection of Information Assets/24. Topic D Encryption.srt
1.5 kB
~Get Your Files Here !/2. Governance and Management of IT/6. Relationship Structure.srt
1.4 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/7. Topic B IS Network Infrastructure.srt
1.4 kB
~Get Your Files Here !/2. Governance and Management of IT/1. Governance and Management of IT.srt
1.4 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/37. Business Continuity Management (BCM).srt
1.4 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/21. Topic C Infrastructure Development and Acquisition.srt
1.3 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/3. Networking Models.srt
1.3 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/25. Facilities, Materials, and Supplies.srt
1.3 kB
~Get Your Files Here !/1. The IS Audit Process/24. Audit Classifications.srt
1.2 kB
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/2. Topic A Project Management.srt
1.2 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/6. Reliability.srt
1.1 kB
~Get Your Files Here !/1. The IS Audit Process/17. Internal Controls (Preventative).srt
1.1 kB
~Get Your Files Here !/4. IS Operations and Business Resilience/5. The OSI Model.srt
1.0 kB
~Get Your Files Here !/1. The IS Audit Process/14. Topic C Internal Controls.srt
979 Bytes
~Get Your Files Here !/2. Governance and Management of IT/16. Goals of Security Governance.srt
931 Bytes
~Get Your Files Here !/1. The IS Audit Process/9. Topic B Risk Analysis.srt
914 Bytes
~Get Your Files Here !/4. IS Operations and Business Resilience/2. Topic A Networking Models.srt
892 Bytes
~Get Your Files Here !/1. The IS Audit Process/32. Computer Assisted Audit.srt
877 Bytes
~Get Your Files Here !/5. Protection of Information Assets/12. Topic C Access Controls.srt
868 Bytes
~Get Your Files Here !/2. Governance and Management of IT/14. Information Security Governance.srt
823 Bytes
~Get Your Files Here !/1. The IS Audit Process/2. Topic A The Auditing Process and Auditors.srt
817 Bytes
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/27. Change Management Standards.srt
799 Bytes
~Get Your Files Here !/2. Governance and Management of IT/17. Topic B Policies, Procedures, and Risk.srt
759 Bytes
~Get Your Files Here !/5. Protection of Information Assets/7. Topic B Threats and Vulnerabilities.srt
609 Bytes
~Get Your Files Here !/2. Governance and Management of IT/2. Topic A The Role of Governance.srt
603 Bytes
~Get Your Files Here !/4. IS Operations and Business Resilience/27. Topic E Disaster Recovery.srt
577 Bytes
~Get Your Files Here !/2. Governance and Management of IT/29. IT Risk Management - Levels.srt
545 Bytes
~Get Your Files Here !/2. Governance and Management of IT/15. Results of Security Governance.srt
543 Bytes
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/14. Alternative Development Methods.srt
542 Bytes
~Get Your Files Here !/2. Governance and Management of IT/30. Topic C IT Governance & Personnel Management.srt
469 Bytes
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/8. Topic B Software Development and Acquisition.srt
452 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
~Get Your Files Here !/5. Protection of Information Assets/2. Topic A Protecting Data.srt
367 Bytes
~Get Your Files Here !/3. IS Operations, Maintenance, and Support/33. Data Validation Checks.srt
333 Bytes
~Get Your Files Here !/5. Protection of Information Assets/28. Topic E Auditing Practices.srt
258 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/4. IS Operations and Business Resilience/20. Topic D Recovery.srt
101 Bytes
~Get Your Files Here !/4. IS Operations and Business Resilience/21. Topic D Recovery.srt
101 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!