Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Duckling
Monogatari
Schlachtfelder
PUSKASA
juramento
FevrierMars
Management
Sketchbook
变局
JUDAEA
Horodecki
Brewtality
Winfried
Interludi
XMas
Guiseppe
medieval
Dubrovsky
Dovzhenko
Resolucion
Archa
1061
Jassica
PracticalChineseReader
Insidern
Mello
EPSRC
Teteault
产业关联
Sourcebooks
Hadrian
Timor
Testmethoden
autorun
罗纳尔多
Erotico
Dmon
Miteru
Ridin
Fantastick
Notfalls
Hiroshige
Zunfthaus
Feidman
Demonstrations
Corkill
Financing
Munzkatalog
事故
Mittermeier
Newest
Technical Inside the SQL Server Query Optimizer
"Multiplexed Networks for Embedded Systems: CAN, LIN, Flexray, Safe-by-Wire..." by Dominique Paret (Repost)
Dino Esposito, "Building Web Solutions with ASP.Net and ADO.NET" (Repost)
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Power Performance - Multimedia Storytelling for Journalism and Public Relations
pluralsight-training.net SQL Server: Transact-SQL Basic Data Retrieval [2012, ENG]
pluralsight-training.net SQL Server: Collecting and Analyzing Trace Data [2012, ENG]
Pluralsight.net - Introduction to Nancy-JWARE
Technical Structured Programming with C++
Technical Getting Started with LaTeX by David R. Wilkins
Windows A Third Window - Natural Life beyond Newton and Darwin
PLURALSIGHT.NET WINDOWS 8 METRO CONNECTED APPS-JGTiSO
PLURALSIGHT.NET WINDOWS 8 METRO APPLICATION DATA-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C PLUS PLUS AND XAML-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C SHARP AND XAML-JGTiSO
PLURALSIGHT.NET INTRODUCTION TO BUILDING WINDOWS 8 METRO APPLICATIONS-JGTiSO
Multimedia over IP and Wireless Networks - Compression, Networking, and Systems
Interactive Distributed Multimedia Systems and Telecommunication Services
The Art of Hardware Architecture - Design Methods and Techniques for Digital Circuits
Pro/ENGINEER WILDFIRE 5.0 Tutorial and MultiMedia CD
"Multiplexed Networks for Embedded Systems: CAN, LIN, Flexray, Safe-by-Wire..." by Dominique Paret (Repost)
Dino Esposito, "Building Web Solutions with ASP.Net and ADO.NET" (Repost)
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Power Performance - Multimedia Storytelling for Journalism and Public Relations
pluralsight-training.net SQL Server: Transact-SQL Basic Data Retrieval [2012, ENG]
pluralsight-training.net SQL Server: Collecting and Analyzing Trace Data [2012, ENG]
Pluralsight.net - Introduction to Nancy-JWARE
Technical Structured Programming with C++
Technical Getting Started with LaTeX by David R. Wilkins
Windows A Third Window - Natural Life beyond Newton and Darwin
PLURALSIGHT.NET WINDOWS 8 METRO CONNECTED APPS-JGTiSO
PLURALSIGHT.NET WINDOWS 8 METRO APPLICATION DATA-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C PLUS PLUS AND XAML-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C SHARP AND XAML-JGTiSO
PLURALSIGHT.NET INTRODUCTION TO BUILDING WINDOWS 8 METRO APPLICATIONS-JGTiSO
Multimedia over IP and Wireless Networks - Compression, Networking, and Systems
Interactive Distributed Multimedia Systems and Telecommunication Services
The Art of Hardware Architecture - Design Methods and Techniques for Digital Circuits
Pro/ENGINEER WILDFIRE 5.0 Tutorial and MultiMedia CD
Useful Links
Technical CBT Nuggets CISA Certification Package/$499.00 - Includes 19 Vid
Posted on 2010-04-11
|
CBT Nuggets CISA Certification Package More Info Code: margin: 0px; padding: 6px; border: 1px inset; width: 640px; height: 34px; text-align: left; overflow: auto"> Certified Information Systems Auditor from ISACA $499.00 - Includes 19 Videos Code: margin: 0px; padding: 6px; border: 1px inset; width: 640px; height: 306px; text-align: left; overflow: auto">Is your organization's critical information protected? ...Really? Without comprehensive security plans, policies, and procedures, your organization's information security could be missing something. And that's all it takes for the worst to happen. As a Certified Information Systems Auditor (CISA), you'll perform a business-critical function -- assess your organization's IT and business systems to ensure they are monitored, controlled, and protected. These are valuable skills... and CISA is a valuable certification There is rapidly growing demand for skilled CISAs. CISA is on the level of CISSP and CCIE in prestige and in the way it distinguishes you from your peers. It's globally recognized within the IT industry and beyond. It's used by the US Department of Defense and others as a minimum requirement for many high-end security positions. And studies have found that just having the CISA credential can increase your salary.* Gain knowledge in 6 critical Information Security areas Instructor Michael Shannon walks you through the 6 major knowledge areas every CISA must be proficient in: Area 1: The Information System Audit Process Area 2: Information Technology Governance Area 3: Systems and Infrastructure Life Cycle Management Area 4: IT Service Delivery and support Area 5: Protection of Information Assets Area 6: Business Continuity and Disaster Recovery These are the building blocks to a successful career as a top-notch information security professional. Here's what you'll learn in each video of the CISA Certification Package: Code: margin: 0px; padding: 6px; border: 1px inset; width: 640px; height: 498px; text-align: left; overflow: auto">Video 1 - "Introduction to CISA" - Why should you become a CISA? In this first nugget you'll discover why CISA is a valuable certification. You'll also learn about the six core CISA knowledge areas. And you'll get a few helpful tips for success on the CISA path. Video 2 - "The IS Audit Process (part 1)" - Before digging deep into information technology auditing, you need to cover the basics. Learn what your responsibilities are as an auditor of information systems. Explore the IT auditing process, risk analysis, and the importance of internal controls. Video 3 - "The IS Audit Process (part 2)" - This nugget investigates audit classifications as well as phases of the auditing process. Learn to apply the risk-based audit methodology, including what qualifies as evidence. Also, explore how to apply Computer Assisted Audit Technique (CAAT) and the Control Self-Assessment (CSA) framework and techniques. Video 4 - "Information Technology Governance (part 1)" - Define corporate and IT governance, including what governance practices and procedures are critical to the auditing process. Discover the realm of Information Security (IS) governance, as well as IS strategy. Video 5 - "Information Technology Governance (part 2)" - In this second nugget on IT governance you'll learn what goes into IT policies and the IS Policy document. You'll also discover what risk management processes and risk analysis methods can be applied. Video 6 - "Information Technology Governance (part 3)" - This last nugget on IT governance explores a few more vital aspects of governance -- personnel management, insourcing, outsourcing, organizational change management, IS quality management, and performance management. Video 7 - "Systems and Infrastructure Life Cycle Management (part 1)" - Four key areas of systems and infrastructure life cycle management are explored in this nugget. These areas are project management structure, practical project management, business application development, and the software development process. Video 8 - "Systems and Infrastructure Life Cycle Management (part 2)" - This nugget continues the flow from part 1, looking at waterfall application development as an alternative method of life cycle management. Then you'll learn about infrastructure development and acquisition, IS maintenance methods, tools and aids you can use, and finally about techniques you can use for improving the audit process. Video 9 - "Systems and Infrastructure Life Cycle Management (part 3)" - In part 3 of systems and infrastructure life cycle management you will learn about application controls and auditing application controls. You will also learn about developing, acquiring and maintaining business application systems. Video 10 - "IT Service Delivery and Support (part 1)" - This first of three movies on IT service delivery and support explores the ISO/OSI model with a story called "The Fellowship of the Token Ring." Video 11 - "IT Service Delivery and Support (part 2)" - In part 2 of this section, you learn all about IS operation and hardware, plus hardware management, IS architecture, and the types of IS software available. Video 12 - "IT Service Delivery and Support (part 3)" - The third and last nugget on IT service delivery and support investigates different network infrastructure taxonomies. We apply the OSI model to LANs, WANs, and VPNs, as well as looking at the difference between wired and wireless VPNs. Video 13 - "Protection of Information Assets (part 1)" - What are the key elements, roles, and responsibilities of the IS auditor in protecting information assets? Learn these, plus the importance of classifying information assets. Also, learn about assigning system access permissions, Mandatory Access Controls (MACs) and Discretionary Access Controls (DACs), what the IS auditor's role is in maintaining privacy, and finally, how to deal with external parties such as service providers, vendors, contractors, and customers. Video 14 - "Protection of Information Assets (part 2)" - This nugget teaches you about logical access control vulnerabilities and access paths. Learn about identification and authentication mechanisms, as well as authorization. You'll wrap up the nugget by exploring how auditors deal with the storage, retrieval, transport, and disposal of data. Video 15 - "Protection of Information Assets (part 3)" - In this nugget, you'll cover the general topics of LAN security, client-server security, wireless security, and internet security. Video 16 - "Protection of Information Assets (part 4)" - Dive into encryption! Learn about encryption mechanisms plus issues with communications through voice over IP and PBX networks. Video 17 - "Protection of Information Assets (part 5)" - This final nugget on protection of information assets explores auditing IS management framework, auditing infrastructure security, physical access controls, and environmental controls. Video 18 - "Disaster Recovery and Business Continuity (part 1)" - You can do a lot to prepare but what do you do when disaster strikes? Learn critical concepts surrounding disaster recovery and business continuity. This includes the business continuity planning (BCP) process, doing a Business Impact Analysis (BIA), and recovery strategies. Video 19 - "Disaster Recovery and Business Continuity (part 2)" - This final nugget in both the topic and series continues where the previous nugget left off. You'll learn how to organize and assign responsibilities dealing with business continuity, deal with the separate BCP components, and finally perform an audit on disaster recovery and business continuity plans. Prerequisites Code: margin: 0px; padding: 6px; border: 1px inset; width: 640px; height: 34px; text-align: left; overflow: auto">A basic understanding of computer networks, such as Network certification or equivalent knowledge is the prerequisite for this training. The CISA Certification Package contains: Code: margin: 0px; padding: 6px; border: 1px inset; width: 640px; height: 322px; text-align: left; overflow: auto">- Introduction to CISA (free video!) - The IS Audit Process (part 1) - The IS Audit Process (part 2) - Information Technology Governance (part 1) - Information Technology Governance (part 2) - Information Technology Governance (part 3) - Systems and Infrastructure Life Cycle Management (part 1) - Systems and Infrastructure Life Cycle Management (part 2) - Systems and Infrastructure Life Cycle Management (part 3) - IT Service Delivery and Support (part 1) - IT Service Delivery and Support (part 2) - IT Service Delivery and Support (part 3) - Protection of Information Assets (part 1) - Protection of Information Assets (part 2) - Protection of Information Assets (part 3) - Protection of Information Assets (part 4) - Protection of Information Assets (part 5) - Disaster Recovery and Business Continuity (part 1) - Disaster Recovery and Business Continuity (part 2) Download Code: margin: 0px; padding: 6px; border: 1px inset; width: 640px; height: 194px; text-align: left; overflow: auto">
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
http://www.cbtnuggets.com/…/product?id=384 | Alive |
Download Link Part 01 | Alive |
Download Link Part 02 | Alive |
Download Link Part 03 | Alive |
Download Link Part 04 | Alive |
Download Link Part 05 | Alive |
Download Link Part 06 | Alive |
Download Link Part 07 | Alive |
Download Link Part 08 | Alive |
Download Link Part 09 | Alive |
Download Link Part 10 | Alive |
Download Link Part 11 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: