Curriculum For This Course
Video tutorials list
-
Lesson 1
Video Name Time 1. Introduction 00:54 2. Audit Process 10:58 3. Auditing Standards 14:26 4. Auditing Guidelines 13:36 5. Cobit Model 02:36 6. Audit Management 12:38 7. Internal Control Classifications 14:27 8. Planning 12:40 9. Program 07:14 10. Evidence 14:31 11. Audit Control Evaluation 12:33 12. C S A Control Self- Assessment 07:54 -
Lesson 2
Video Name Time 1. IT Governance 12:37 2. Outsourcing and Governance 12:10 3. Security Policies 08:07 4. IT Strategy 05:39 5. Organizational Compliance 02:23 6. Outsourcing and Globalization 07:27 7. IT Performance 05:09 -
Lesson 3
Video Name Time 1. System And Infrastructure 08:32 2. Requirements 13:24 3. Project Management Tools- Part1 11:54 4. Project Management Tools- Part2 13:38 5. Applications 10:16 6. Agile Development 15:06 7. Monitoring And Controlling 10:38 8. Acquisition Process 10:59 9. Testing Process 14:19 10. Information Systems Maintenance Practices 12:55 11. Data Conversion Tools 14:15 -
Lesson 4
Video Name Time 1. Media Disposal Process 08:41 2. Post Implementation Review 06:43 3. Periodic Review 09:32 4. System Maintenance 07:26 -
Lesson 5
Video Name Time 1. IT Service Delivery And Support 11:56 2. How To Evaluate Service Level Management Practices 03:33 3. Operations Management 13:04 4. Databases 09:49 5. Structured Query Language 10:21 6. Monitoring Performance 13:48 7. Source Code And Performance Monitoring 07:21 8. Patch Management 07:46 9. Incident Management 12:16 10. Hardware Component Types 13:00 11. Network Component Types 12:48 -
Lesson 6
Video Name Time 1. I S Auditor Technical Overview 11:17 2. Security Design 13:21 3. Monitoring Systems 13:40 4. Types of Attacks 15:08 5. Cryptography 08:02 6. Encryption 05:34 7. Asymmetric Encryption 11:08 8. Digital Certificate 14:05 9. Different Kinds of Attacks 12:08 10. Access Controls 11:45 11. Identification and Authentication 13:42 12. Physical Access Exposure 09:08 13. Environmental Security 13:50 14. Network Security Devices and Network Components 13:46 15. Network Address Translation 07:08 16. Virtual Private Networks 08:34 17. Voice System Risks 12:09 18. Intrusion Detection 04:12 19. Firewalls 11:10 20. Firewall Implementation 06:32 21. Network Access Protection 05:46 22. Honey Pot 03:46 23. Risks to Portable And Wireless Devices 11:28 24. Bluetooth 07:20 25. OSI Networking 13:03 26. Managing Data 08:23 -
Lesson 7
Video Name Time 1. Business Continuity and Disaster Recovery 10:53 2. Fault Tolerance 07:36 3. Business Continuity and Disaster Recovery Regulations 10:07
Add Comment