Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99/24.99
Lectures |
---|
1. Introduction- 54s |
2. Audit Process- 10m 58s |
3. Auditing Standards- 14m 26s |
4. Auditing Guidelines- 13m 36s |
5. Cobit Model- 2m 36s |
6. Audit Management- 12m 38s |
7. Internal Control Classifications- 14m 27s |
8. Planning- 12m 40s |
9. Program- 7m 14s |
10. Evidence- 14m 31s |
11. Audit Control Evaluation- 12m 33s |
12. C S A Control Self- Assessment- 7m 54s |
Lectures |
---|
1. IT Governance- 12m 37s |
2. Outsourcing and Governance- 12m 10s |
3. Security Policies- 8m 7s |
4. IT Strategy- 5m 39s |
5. Organizational Compliance- 2m 23s |
6. Outsourcing and Globalization- 7m 27s |
7. IT Performance- 5m 9s |
Lectures |
---|
1. System And Infrastructure- 8m 32s |
2. Requirements- 13m 24s |
3. Project Management Tools- Part1- 11m 54s |
4. Project Management Tools- Part2- 13m 38s |
5. Applications- 10m 16s |
6. Agile Development- 15m 6s |
7. Monitoring And Controlling- 10m 38s |
8. Acquisition Process- 10m 59s |
9. Testing Process- 14m 19s |
10. Information Systems Maintenance Practices- 12m 55s |
11. Data Conversion Tools- 14m 15s |
Lectures |
---|
1. Media Disposal Process- 8m 41s |
2. Post Implementation Review- 6m 43s |
3. Periodic Review- 9m 32s |
4. System Maintenance- 7m 26s |
Lectures |
---|
1. IT Service Delivery And Support- 11m 56s |
2. How To Evaluate Service Level Management Practices- 3m 33s |
3. Operations Management- 13m 4s |
4. Databases- 9m 49s |
5. Structured Query Language- 10m 21s |
6. Monitoring Performance- 13m 48s |
7. Source Code And Performance Monitoring- 7m 21s |
8. Patch Management- 7m 46s |
9. Incident Management- 12m 16s |
10. Hardware Component Types- 13m |
11. Network Component Types- 12m 48s |
Lectures |
---|
1. I S Auditor Technical Overview- 11m 17s |
2. Security Design- 13m 21s |
3. Monitoring Systems- 13m 40s |
4. Types of Attacks- 15m 8s |
5. Cryptography- 8m 2s |
6. Encryption- 5m 34s |
7. Asymmetric Encryption- 11m 8s |
8. Digital Certificate- 14m 5s |
9. Different Kinds of Attacks- 12m 8s |
10. Access Controls- 11m 45s |
11. Identification and Authentication- 13m 42s |
12. Physical Access Exposure- 9m 8s |
13. Environmental Security- 13m 50s |
14. Network Security Devices and Network Components- 13m 46s |
15. Network Address Translation- 7m 8s |
16. Virtual Private Networks- 8m 34s |
17. Voice System Risks- 12m 9s |
18. Intrusion Detection- 4m 12s |
19. Firewalls- 11m 10s |
20. Firewall Implementation- 6m 32s |
21. Network Access Protection- 5m 46s |
22. Honey Pot- 3m 46s |
23. Risks to Portable And Wireless Devices- 11m 28s |
24. Bluetooth- 7m 20s |
25. OSI Networking- 13m 3s |
26. Managing Data- 8m 23s |
Lectures |
---|
1. Business Continuity and Disaster Recovery- 10m 53s |
2. Fault Tolerance- 7m 36s |
3. Business Continuity and Disaster Recovery Regulations- 10m 7s |
PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.
Other Pages
© 2025 All Rights Reserved passqueen.com.