Srbija Posted November 25, 2022 #1 Posted November 25, 2022 Technology Systems Auditing (Part 1 Of 2) Last updated 9/2019 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 12.89 GB | Duration: 11h 7m Technology Systems Auditing Training Course What you'll learn IT audit process IT governance Systems and infrastructure lifecycle management IT service delivery and support Protection of information assets Business continuity and disaster recovery Requirements The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems. This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience. Description The IT Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.If you're a professional with experience of participating, leading and directing information system projects, this online IT Systems Auditing course will help you prepare for a lucrative and highly sought after position in this exciting and challenging field of information technology. Completing this course showcases your knowledge of IS auditing, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within an enterprise. After completing this training course you will be able to leverage standards, manage vulnerabilities, you will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise, and the Acquisition process and testing process.IT Systems Auditing is one of the most popular and high-demand IT employment options available. The course offers the ability for students to gain comprehensive knowledge in concepts that are required to get into the field of IT Systems Auditing. Get your start in the world of IT Systems Auditing by taking this course today. Part 2 of this course is also available to complete your education. This course is in no way sponsored or endorsed by, or in any way affiliated with, ISACA. Overview Section 1: Module 01 -The Process of Auditing Information Systems Lecture 1 Introduction Lecture 2 Lesson 1: Management of the Audit Function Lecture 3 Organization of the IS Audit Function Lecture 4 IS Audit Resource Management Lecture 5 Audit Planning Part1 Lecture 6 Audit Planning Part2 Lecture 7 Audit Planning Part3 Lecture 8 Audit Planning Part4 Lecture 9 Audit Planning Part5 Lecture 10 Effect of Laws and Regulations on IS Audit Planning Part1 Lecture 11 Effect of Laws and Regulations on IS Audit Planning Part2 Lecture 12 Effect of Laws and Regulations on IS Audit Planning Part3 Lecture 13 Effect of Laws and Regulations on IS Audit Planning Part4 Lecture 14 Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1 Lecture 15 IT Audit and Assurance Standards and Guidelines Part2 Lecture 16 IT Audit and Assurance Standards and Guidelines Part3 Lecture 17 IT Audit and Assurance Standards and Guidelines Part4 Lecture 18 IT Audit And Assurance Standards Framework Lecture 19 Auditing Standards Part1 Lecture 20 Auditing Standards Part2 Lecture 21 Auditing Standards Part3 Lecture 22 Auditing Standards Part4 Lecture 23 Auditing Standards Part5 Lecture 24 Auditing Standards Part6 Lecture 25 Auditing Standards Part7 Lecture 26 Auditing Standards Part8 Lecture 27 Auditing Standards Part9 Lecture 28 Audit Guidelines Part1 Lecture 29 Audit Guidelines Part2 Lecture 30 Audit Guidelines Part3 Lecture 31 Audit Guidelines Part4 Lecture 32 Audit Guidelines Part5 Lecture 33 Audit Guidelines Part6 Lecture 34 Audit Guidelines Part7 Lecture 35 Audit Guidelines Part8 Lecture 36 Audit Guidelines Part9 Lecture 37 Audit Guidelines Part10 Lecture 38 Audit Guidelines Part11 Lecture 39 Audit Guidelines Part12 Lecture 40 Audit and Assurance Tools and Techniques Lecture 41 Relationship Among Standards, Guidelines, and Tools and Techniques Lecture 42 Information Technology Assurance Framework Lecture 43 Information Technology Assurance Framework Components Lecture 44 ITAF General Standards (Section 2200) Part1 Lecture 45 ITAF General Standards (Section 2200) Part2 Lecture 46 ITAF Performance Standards (Section 2400) Part1 Lecture 47 ITAF Performance Standards (Section 2400) Part2 Lecture 48 ITAF Performance Standards (Section 2400) Part3 Lecture 49 ITAF Performance Standards (Section 2400) Part4 Lecture 50 Reporting Standards (Section 2600) Part1 Lecture 51 Reporting Standards (Section 2600) Part2 Lecture 52 Reporting Standards (Section 2600) Part3 Lecture 53 IT Assurance Guidelines (Section 3000) Part1 Lecture 54 IT Assurance Guidelines (Section 3000) Part2 Lecture 55 IT Assurance Guidelines (Section 3000) Part3 Lecture 56 IT Assurance Guidelines (Section 3000) Part4 Lecture 57 IT Assurance Guidelines (Section 3000) Part5 Lecture 58 IT Assurance Guidelines (Section 3000) Part6 Lecture 59 IT Assurance Guidelines (Section 3000) Part7 Lecture 60 IT Assurance Guidelines (Section 3000) Part8 Lecture 61 IT Assurance Guidelines (Section 3000) Part9 Lecture 62 IT Assurance Guidelines (Section 3000) Part10 Lecture 63 IT Assurance Guidelines (Section 3000) Part11 Lecture 64 Lesson 3: Risk Analysis Lecture 65 Risk Analysis Part1 Lecture 66 Risk Analysis Part2 Lecture 67 Risk Analysis Part3 Lecture 68 Risk Analysis Part4 Lecture 69 Risk Analysis Part5 Lecture 70 Risk Analysis Part6 Lecture 71 Risk Analysis Part7 Lecture 72 Lesson 4: Internal Controls Lecture 73 Internal Control Objectives Lecture 74 IS Control Objectives Part1 Lecture 75 IS Control Objectives Part2 Lecture 76 IS Control Objectives Part3 Lecture 77 COBIT Lecture 78 General Controls Part1 Lecture 79 General Controls Part2 Lecture 80 IS Controls Lecture 81 Lesson 5: Performing An IS Audit Lecture 82 Performing an IS Audit Lecture 83 Classification of Audits Lecture 84 Audit Programs Part1 Lecture 85 Audit Programs Part2 Lecture 86 Audit Methodology Part1 Lecture 87 Audit Methodology Part2 Lecture 88 Audit Methodology Part3 Lecture 89 Fraud Detection Part1 Lecture 90 Fraud Detection Part2 Lecture 91 Risk-Based Auditing Part1 Lecture 92 Risk-Based Auditing Part2 Lecture 93 Risk-Based Auditing Part3 Lecture 94 Audit Risk and Materiality Part1 Lecture 95 Audit Risk and Materiality Part2 Lecture 96 Audit Risk and Materiality Part3 Lecture 97 Audit Risk and Materiality Part4 Lecture 98 Audit Risk and Materiality Part5 Lecture 99 Risk Assessment and Treatment Part1 Lecture 100 Risk Assessment and Treatment Part2 Lecture 101 Risk Assessment and Treatment Part3 Lecture 102 Risk Assessment and Treatment Part4 Lecture 103 Risk Assessment and Treatment Part5 Lecture 104 Risk Assessment Techniques Part1 Lecture 105 Risk Assessment Techniques Part2 Lecture 106 Risk Assessment Techniques Part3 Lecture 107 Risk Assessment Techniques Part4 Lecture 108 Audit Objectives Part1 Lecture 109 Audit Objectives Part2 Lecture 110 Compliance Versus Substantive Testing Part1 Lecture 111 Compliance Versus Substantive Testing Part2 Lecture 112 Compliance Versus Substantive Testing Part3 Lecture 113 Evidence Part1 Lecture 114 Evidence Part2 Lecture 115 Evidence Part3 Lecture 116 Interviewing and Observing Personnel in the Performance Of Their Duties Lecture 117 Sampling Part1 Lecture 118 Sampling Part2 Lecture 119 Sampling Part3 Lecture 120 Using The Services Of Other Auditors And Experts Part1 Lecture 121 Using The Services Of Other Auditors And Experts Part2 Lecture 122 Computer-Assisted Audit Techniques (CAAT) Part1 Lecture 123 Computer-Assisted Audit Techniques (CAAT) Part2 Lecture 124 Evaluation Of Audit Strengths And Weaknesses Part1 Lecture 125 Evaluation Of Audit Strengths And Weaknesses Part2 Lecture 126 Evaluation Of Audit Strengths And Weaknesses Part3 Lecture 127 Communicating Audit Results Part1 Lecture 128 Communicating Audit Results Part2 Lecture 129 Communicating Audit Results Part3 Lecture 130 Management Implementation Of Recommendations Lecture 131 Audit Documentation Lecture 132 Lesson 6: Control Self-Assessment Part1 Lecture 133 Control Self-Assessment Part2 Lecture 134 Control Self-Assessment Part3 Lecture 135 Objectives of CSA Lecture 136 Benefits of CSA Lecture 137 Disadvantages of CSA Lecture 138 Auditor Role in CSA Lecture 139 Technology Drivers for CSA Lecture 140 Traditional Versus CSA Approach Lecture 141 Lesson 7: The Evolving IS Audit Process Lecture 142 Automated Work Papers Part1 Lecture 143 Automated Work Papers Part2 Lecture 144 Integrated Auditing Part1 Lecture 145 Integrated Auditing Part2 Lecture 146 Integrated Auditing Part3 Lecture 147 Continuous Auditing Part1 Lecture 148 Continuous Auditing Part2 Lecture 149 Continuous Auditing Part3 Lecture 150 Continuous Auditing Part4 Lecture 151 Continuous Auditing Part5 Lecture 152 Module 01 Review Section 2: Module 02 - Governance and Management of IT Lecture 153 Introduction Lecture 154 Lesson 1: Corporate Governance Lecture 155 Corporate Governance Part1 Lecture 156 Corporate Governance Part2 Lecture 157 Corporate Governance Part3 Lecture 158 Lesson 2: IT Governance Lecture 159 IT Governance Part1 Lecture 160 IT Governance Part2 Lecture 161 Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management Lecture 162 IT Monitoring and Assurance Practices for Board and Senior Management Part1 Lecture 163 IT Monitoring and Assurance Practices for Board and Senior Management Part2 Lecture 164 IT Monitoring and Assurance Practices for Board and Senior Management Part3 Lecture 165 Best Practices for IT Governance Part1 Lecture 166 Best Practices for IT Governance Part2 Lecture 167 Best Practices for IT Governance Part3 Lecture 168 Best Practices for IT Governance Part4 Lecture 169 IT Governance Frameworks Lecture 170 Audit Role in IT Governance Part1 Lecture 171 Audit Role in IT Governance Part2 Lecture 172 Audit Role in IT Governance Part3 Lecture 173 Audit Role in IT Governance Part4 Lecture 174 IT Strategy Committee Lecture 175 IT Balanced Scorecard Part1 Lecture 176 IT Balanced Scorecard Part2 Lecture 177 Information Security Governance Part1 Lecture 178 Information Security Governance Part2 Lecture 179 Information Security Governance Part3 Lecture 180 Information Security Governance Part4 Lecture 181 Importance of Information Security Governance Part1 Lecture 182 Importance of Information Security Governance Part2 Lecture 183 Outcomes of Security Governance Part1 Lecture 184 Outcomes of Security Governance Part2 Lecture 185 Effective Information Security Governance Lecture 186 Roles and Responsibilities of Senior Management and Board of Directors Part1 Lecture 187 Roles and Responsibilities of Senior Management and Board of Directors Part2 Lecture 188 Enterprise Architecture Lecture 189 Lesson 4: Information Systems Strategy Lecture 190 Strategic Planning Part1 Lecture 191 Strategic Planning Part2 Lecture 192 Steering Committee Lecture 193 Lesson 5: Maturity and Process Improvement Models Lecture 194 Maturity and Process Improvement Models Lecture 195 Lesson 6: IT Investment and Allocation Practices Lecture 196 IT Investment and Allocation Practices Part1 Lecture 197 IT Investment and Allocation Practices Part2 Lecture 198 IT Investment and Allocation Practices Part3 Lecture 199 IT Investment and Allocation Practices Part4 Lecture 200 Implement IT Portfolio Management Lecture 201 IT Portfolio Management Versus Balanced Scorecard Lecture 202 Lesson 7: Policies and Procedures Lecture 203 Policies Part1 Lecture 204 Policies Part2 Lecture 205 Policies Part3 Lecture 206 Information Security Policy Part1 Lecture 207 Information Security Policy Part2 Lecture 208 Information Security Policy Part3 Lecture 209 Information Security Policy Part4 Lecture 210 Information Security Policy Part5 Lecture 211 Information Security Policy Part6 Lecture 212 Information Security Policy Part7 Lecture 213 Procedures Part1 Lecture 214 Procedures Part2 Lecture 215 Lesson 8: Risk Management Lecture 216 Risk Management Lecture 217 Developing a Risk Management Program Lecture 218 Risk Management Process Part1 Lecture 219 Risk Management Process Part2 Lecture 220 Risk Management Process Part3 Lecture 221 Risk Management Process Part4 Lecture 222 Risk Management Process Part5 Lecture 223 Risk Management Process Part6 Lecture 224 Risk Analysis Methods Part1 Lecture 225 Risk Analysis Methods Part2 Lecture 226 Risk Analysis Methods Part3 Lecture 227 Risk Analysis Methods Part4 Lecture 228 Risk Analysis Methods Part5 Lecture 229 Lesson 9: IS Management Practices Lecture 230 Human Resource Management Part1 Lecture 231 Human Resource Management Part2 Lecture 232 Human Resource Management Part3 Lecture 233 Human Resource Management Part4 Lecture 234 Human Resource Management Part5 Lecture 235 Human Resource Management Part6 Lecture 236 Human Resource Management Part7 Lecture 237 Human Resource Management Part8 Lecture 238 Human Resource Management Part9 Lecture 239 Human Resource Management Part10 Lecture 240 Human Resource Management Part11 Lecture 241 Human Resource Management Part12 Lecture 242 Human Resource Management Part13 Lecture 243 Human Resource Management Part14 Lecture 244 Organizational Change Management Lecture 245 Financial Management Practices Lecture 246 Quality Management Part1 Lecture 247 Quality Management Part2 Lecture 248 Quality Management Part3 Lecture 249 Information Security Management Lecture 250 Performance Optimization Part1 Lecture 251 Performance Optimization Part2 Lecture 252 Performance Optimization Part3 Lecture 253 Lesson 10: IS Organizational Structure and Responsibilities Lecture 254 IS Roles and Responsibilities Part1 Lecture 255 IS Roles and Responsibilities Part2 Lecture 256 IS Roles and Responsibilities Part3 Lecture 257 Segregation of Duties Lecture 258 Segregation of Duties Controls Part1 Lecture 259 Segregation of Duties Controls Part2 Lecture 260 Compensating Controls for Lack of Segregation Lecture 261 Lesson 11: Auditing IT Governance Structure and Implementation Lecture 262 Reviewing Documentation Part1 Lecture 263 Reviewing Documentation Part2 Lecture 264 Reviewing Contractual Commitments Lecture 265 Lesson 12: Business Continuity Planning Part1 Lecture 266 Business Continuity Planning Part2 Lecture 267 Business Continuity Planning Part3 Lecture 268 IS Business Continuity Planning Lecture 269 Disasters and Other Disruptive Events Part1 Lecture 270 Disasters and Other Disruptive Events Part2 Lecture 271 Business Continuity Planning Process Lecture 272 Business Continuity Policy Lecture 273 Business Impact Analysis Part1 Lecture 274 Business Impact Analysis Part2 Lecture 275 Classification of Operations and Criticality Analysis Lecture 276 Development of Business Continuity Plans Lecture 277 Other Issues and Plan Development Lecture 278 Components of a BCP Part1 Lecture 279 Components of a BCP Part2 Lecture 280 BCP Testing Part1 Lecture 281 BCP Testing Part2 Lecture 282 BCP Testing Part3 Lecture 283 BCP Maintenance Lecture 284 Summary of BCP Lecture 285 Module 02 Review Section 3: Module 03 - Information Systems Acquisition, Development and Implementation Lecture 286 Lesson 1: Business Realization Part1 Lecture 287 Business Realization Part2 Lecture 288 Portfolio/Program Management Part1 Lecture 289 Portfolio/Program Management Part2 Lecture 290 Portfolio/Program Management Part3 Lecture 291 Portfolio/Program Management Part4 Lecture 292 Portfolio/Program Management Part5 Lecture 293 Business Case Development and Approval Part1 Lecture 294 Business Case Development and Approval Part2 Lecture 295 Benefits Realization Techniques Lecture 296 Lesson 2: Project Management Structure Lecture 297 Project Context and Environment Lecture 298 Project Organizational Forms Part1 Lecture 299 Project Organizational Forms Part2 Lecture 300 Project Communication and Culture Lecture 301 Project Objectives Part1 Lecture 302 Project Objectives Part2 Lecture 303 Project Objectives Part3 Lecture 304 Roles and Responsibilities of Groups and Individuals Part1 Lecture 305 Roles and Responsibilities of Groups and Individuals Part2 Lecture 306 Roles and Responsibilities of Groups and Individuals Part3 Lecture 307 Lesson 3: Project Management Practices Lecture 308 Initiation of a Project Lecture 309 Project Planning Lecture 310 Example of Project Management for New Software Lecture 311 Software Size Estimation Lecture 312 Lines of Source Code Lecture 313 Function Point Analysis (FPA) Lecture 314 Function Points Lecture 315 Cost Budgets Lecture 316 Software Cost Estimation Lecture 317 Scheduling and Establishing the Timeframe Lecture 318 Critical Path Methodology Lecture 319 Gantt Charts Lecture 320 Program Evaluation Review Technique (PERT) Lecture 321 Time Box Management Lecture 322 General Project Management Lecture 323 Project Controlling Part1 Lecture 324 Project Controlling Part2 Lecture 325 Management of Resource Usage Lecture 326 Management of Risk Part1 Lecture 327 Management of Risk Part2 Lecture 328 Closing a Project Lecture 329 Lesson 4: Business Application Development Part1 Lecture 330 Business Application Development Part2 Lecture 331 Business Application Development Part3 Lecture 332 Business Application Development Part4 Lecture 333 Business Application Development Part5 Lecture 334 Traditional SDLC Approach Lecture 335 SDLC Phases Lecture 336 SDLC Lecture 337 Integrated Resource Management Systems Part1 Lecture 338 Integrated Resource Management Systems Part2 Lecture 339 Integrated Resource Management Systems Part3 Lecture 340 Description of SDLC Phases Part1 Lecture 341 Description of SDLC Phases Part2 Lecture 342 Description of SDLC Phases Part3 Lecture 343 Description of SDLC Phases Part4 Lecture 344 Description of SDLC Phases Part5 Lecture 345 Description of SDLC Phases Part6 Lecture 346 Description of SDLC Phases Part7 Lecture 347 Description of SDLC Phases Part8 Lecture 348 Description of SDLC Phases Part9 Lecture 349 Description of SDLC Phases Part10 Lecture 350 Description of SDLC Phases Part11 Lecture 351 Description of SDLC Phases Part12 Lecture 352 Description of SDLC Phases Part13 Lecture 353 Description of SDLC Phases Part14 Lecture 354 Description of SDLC Phases Part15 Lecture 355 Description of SDLC Phases Part16 Lecture 356 Description of SDLC Phases Part17 Lecture 357 Description of SDLC Phases Part18 Lecture 358 Description of SDLC Phases Part19 Lecture 359 Description of SDLC Phases Part20 Lecture 360 Description of SDLC Phases Part21 Lecture 361 Description of SDLC Phases Part22 Lecture 362 Description of SDLC Phases Part23 Lecture 363 Risks Associated with Software Development Part1 Lecture 364 Risks Associated with Software Development Part2 Lecture 365 Lesson 5: Business Application Systems Lecture 366 Electronic Commerce Lecture 367 E-Commerce Models Lecture 368 E-Commerce Architectures Lecture 369 E-Commerce Risks Lecture 370 E-Commerce Requirements Lecture 371 E-Commerce Audit and Control Issues or Best Practices Lecture 372 Components of PKI Lecture 373 Electronic Data Interchange Lecture 374 General Requirements of EDI Lecture 375 Traditional EDI Lecture 376 Web Based EDI Lecture 377 EDI Risks and Controls Lecture 378 Controls in EDI Environment Part1 Lecture 379 Controls in EDI Environment Part2 Lecture 380 Controls in EDI Environment Part3 Lecture 381 Controls in EDI Environment Part4 Lecture 382 E-Mail Lecture 383 E-Mail Security Issues Lecture 384 Standards for E-Mail Security Part1 Lecture 385 Standards for E-Mail Security Part2 Lecture 386 Standards for E-Mail Security Part3 Lecture 387 Point-Of-Sale Systems (POS) Lecture 388 Electronic Banking Part1 Lecture 389 Electronic Banking Part2 Lecture 390 Risk Management Challenges in E-Banking Lecture 391 Risk Management Controls for E-Banking Part1 Lecture 392 Risk Management Controls for E-Banking Part2 Lecture 393 Electronic Finance Lecture 394 Payment Systems Lecture 395 Electronic Money Model Lecture 396 Electronic Checks Model Lecture 397 Electronic Transfer Model Lecture 398 Electronic Funds Transfer Lecture 399 Controls in an EFT Environment Part1 Lecture 400 Controls in an EFT Environment Part2 Lecture 401 Automated Teller Machines Part1 Lecture 402 Automated Teller Machines Part2 Lecture 403 Image Processing Part1 Lecture 404 Image Processing Part2 Lecture 405 Business Intelligence Lecture 406 Decision Support System (DSS) Lecture 407 DSS Frameworks Lecture 408 Customer Relation Management (CRM) Lecture 409 Supply Chain Management (SCM) Lecture 410 Lesson 6: Alternative Forms of Software Project Organization Part1 Lecture 411 Alternative Forms of Software Project Organization Part2 Lecture 412 Alternative Forms of Software Project Organization Part3 Lecture 413 Agile Development Lecture 414 Prototyping Lecture 415 Rapid Application Development (RAD) Lecture 416 Lesson 7: Alternative Development Methods Lecture 417 Data Oriented System Development Lecture 418 Object Oriented System Development Part1 Lecture 419 Object Oriented System Development Part2 Lecture 420 Component-Based Development Lecture 421 Web-Based Application Development Lecture 422 Software Reengineering Lecture 423 Reverse Engineering Lecture 424 Lesson 8: Infrastructure Development/Acquisition Practices Part1 Lecture 425 Infrastructure Development/Acquisition Practices Part2 Lecture 426 Infrastructure Development/Acquisition Practices Part3 Lecture 427 Project Phases of Physical Architecture Analysis Part1 Lecture 428 Project Phases of Physical Architecture Analysis Part2 Lecture 429 Planning Implementation of Infrastructure Part1 Lecture 430 Planning Implementation of Infrastructure Part2 Lecture 431 Critical Success Factors Lecture 432 Hardware Acquisition Lecture 433 Acquisition Steps Part1 Lecture 434 Acquisition Steps Part2 Lecture 435 System Software Acquisition Lecture 436 System Software Implementation Lecture 437 System Software Change Control Procedures Lecture 438 Lesson 9: Information Systems Maintenance Practices Lecture 439 Change Management Process Overview Lecture 440 Deploying Changes Lecture 441 Documentation Lecture 442 Testing Changed Programs Lecture 443 Auditing Program Changes Lecture 444 Emergency Changes Lecture 445 Change Exposures (Unauthorized Changes) Lecture 446 Configuration Management Part1 Lecture 447 Configuration Management Part2 Lecture 448 Lesson 10: System Development Tools And Productivity Aids Lecture 449 Code Generators Lecture 450 Computer Aided Software Engineering Part1 Lecture 451 Computer Aided Software Engineering Part2 Lecture 452 Computer Aided Software Engineering Part3 Lecture 453 Fourth-Generation Languages (4GL) Part1 Lecture 454 Fourth-Generation Languages (4GL) Part2 Lecture 455 Lesson 11: Business Process Reengineering And Process Change Projects Lecture 456 Business Process Reengineering And Process Change Projects Continued Lecture 457 Benchmarking Process Part1 Lecture 458 Benchmarking Process Part2 Lecture 459 The Benchmarking Process Lecture 460 ISO 9126 Lecture 461 Software Capability Maturity Model Lecture 462 ISO 15504 Lecture 463 Lesson 12: Application Controls Lecture 464 Inputs Controls Part1 Lecture 465 Inputs Controls Part2 Lecture 466 Inputs Controls Part3 Lecture 467 Inputs Controls Part4 Lecture 468 Processing Procedures And Controls Lecture 469 Processing Controls Lecture 470 Data File Control Procedures Lecture 471 Output Controls Part1 Lecture 472 Output Controls Part2 Lecture 473 Business Process Control Assurance Lecture 474 Lesson 13: Auditing Application Controls Part1 Lecture 475 Auditing Application Controls Part2 Lecture 476 Risk Assessment Model To Analyze Application Controls Lecture 477 Observing And Testing User Performing Procedures Lecture 478 Data Integrity Testing Lecture 479 Example Of Referential And Relational Integrity Lecture 480 Data Integrity In Online Transaction Processing Systems Lecture 481 Test Application Systems Lecture 482 Continuous Online Auditing Lecture 483 Online Auditing Techniques Lecture 484 Lesson 14: Auditing Systems Development, Acquisition And Maintenance Lecture 485 Project Management Lecture 486 Feasibility Study Lecture 487 Requirements Definition Lecture 488 Software Acquisition Process Lecture 489 Detailed Design And Development Lecture 490 Testing Lecture 491 Implementation Phase Lecture 492 Post Implementation Review Lecture 493 System Change Procedures And The Program Migration Process Lecture 494 Module 03 Review Section 4: Module 04 - Information Systems Operations, Maintenance and Support Lecture 495 Introduction Lecture 496 Lesson 1: Information Systems Operations Lecture 497 Management of IS Operations Lecture 498 Service Management Part1 Lecture 499 Service Management Part2 Lecture 500 Service Management Part3 Lecture 501 Service Management Part4 Lecture 502 Service Management Part5 Lecture 503 Service Level Part1 Lecture 504 Service Level Part2 Lecture 505 Infrastructure Operations Lecture 506 Scheduling Part1 Lecture 507 Scheduling Part2 Lecture 508 Monitoring Use of Resources Lecture 509 Process of Incident Handling Lecture 510 Problem Management Lecture 511 Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions Lecture 512 Support/Helpdesk Part1 Lecture 513 Support/Helpdesk Part2 Lecture 514 Change Management Process Part1 Lecture 515 Change Management Process Part2 Lecture 516 Release Management Part1 Lecture 517 Release Management Part2 Lecture 518 Information Security Management Lecture 519 Media Sanitization Lecture 520 Lesson 2: Information Systems Hardware Lecture 521 Computer Hardware Components and Architecture Lecture 522 Common Enterprise Backend Devices Lecture 523 Specialized Devices Lecture 524 Risks Lecture 525 Security Control Lecture 526 Radiofrequency Identification Lecture 527 RFID Applications Lecture 528 RFID Risks Lecture 529 RFID Security Control Lecture 530 Hardware Maintenance Program Lecture 531 Hardware Monitoring Procedures Lecture 532 Capacity Management Part1 Lecture 533 Capacity Management Part2 IT audit, control, assurance, and security professionals,IT consultants, auditors, and managers,Security policy writers,Privacy officers,Information security officers,Network and system administrators,Network security engineers Homepage Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content.
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now