* Cantinho Satkeys

Refresh History
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    Hoje às 11:39
  • j.s.: tenham um bom fim de semana,   49E09B4F 49E09B4F
    07 de Fevereiro de 2026, 14:31
  • j.s.: dgtgtr a todos  49E09B4F
    07 de Fevereiro de 2026, 14:30
  • FELISCUNHA: ghyt74  pessoall 49E09B4F
    06 de Fevereiro de 2026, 12:00
  • JPratas: try65hytr A Todos  4tj97u<z  2dgh8i k7y8j0 classic
    06 de Fevereiro de 2026, 05:17
  • joca34: ola amigos alguem tem este cd Ti Maria da Peida -  Mãe negra
    05 de Fevereiro de 2026, 16:09
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    03 de Fevereiro de 2026, 11:46
  • Robi80g: CIAO A TUTTI
    03 de Fevereiro de 2026, 10:53
  • Robi80g: THE SWAP FILM WALT DISNEY
    03 de Fevereiro de 2026, 10:50
  • Robi80g: SWAP
    03 de Fevereiro de 2026, 10:50
  • j.s.: dgtgtr a todos  49E09B4F
    02 de Fevereiro de 2026, 16:50
  • FELISCUNHA: ghyt74  pessoal   4tj97u<z
    02 de Fevereiro de 2026, 11:41
  • j.s.: try65hytr a todos  49E09B4F
    29 de Janeiro de 2026, 21:01
  • FELISCUNHA: ghyt74  pessoal  4tj97u<z
    26 de Janeiro de 2026, 11:00
  • espioca: avast vpn
    26 de Janeiro de 2026, 06:27
  • j.s.: dgtgtr  todos  49E09B4F
    25 de Janeiro de 2026, 15:36
  • Radio TugaNet: Bom Dia Gente Boa
    25 de Janeiro de 2026, 10:18
  • FELISCUNHA: dgtgtr   49E09B4F  e bom fim de semana  4tj97u<z
    24 de Janeiro de 2026, 12:15
  • Cocanate: J]a esta no Forun
    24 de Janeiro de 2026, 01:54
  • Cocanate: Eu tenho
    24 de Janeiro de 2026, 01:46

Autor Tópico: Technology Systems Auditing  (Lida 237 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 129146
  • Karma: +0/-0
Technology Systems Auditing
« em: 14 de Julho de 2021, 17:05 »

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 183 lectures (10h 5m) | Size: 886.5 MB
Technology Systems Auditing Training Course

What you'll learn:
Understand the IS audit process
Plan audit and Perform risk analysis
Put in place internal controls
Learn about different phases of IS audit
Understand the role of governance in IT/IS
Make policies, procedures and identify risks
Create information security policy document
Conduct management reviews of the policy document
Perform risk management
Create insourcing and outsourcing strategy
Perform organizational quality management
Create project management structure
Introduce application development best practices
Plan IS operations and business resiliency plans
Define RPO/RTO
Develop disaster recovery plan
Protect information assets
Identify exposures and vulnerabilities
Understand role of encryption in data protection
Learn the basics of computer forensics

Requirements
It is expected that the candidates taking part in this course have a basic know-how of the information security management, business critical information, cyber security, data loss protection and other technologies. However, this course comprehensively covers the topics related to information systems auditing and policy making.

Description
Information systems have become an integral part of any modern organization. Many of the business processes are now dependent on the information systems and the data contained in these systems is of critical importance to any enterprise. The need to protect and safeguard these systems is also directly proportional to the increase in their usage. With the information systems becoming so important, the attacks and threats including but not limited to ransomware, data theft, hacking, forgery and brute force are also on the rise. More and more attackers are targeting organization with less control and protection. This course prepares the candidates to put in place effective controls and policies to protect their information systems and assets from unauthorized access and leakage.

Information systems auditor course is a comprehensive course designed with the objective of preparing the candidates to be able to familiarize themselves with the IS audit process, governance, management of IT, IS operations, maintenance and support, IS operations and business resilience as well as protection of information assets.

These information systems or assets can be in the form of databases, files, images, documents and software. The course covers the protection methods and techniques regardless of the form the data is residing within the organization.

Overall, the course touches all the aspects required to become an effective information systems auditor and perform the task efficiently. This course also helps the candidates to prepare for the relevant certification

Who this course is for
Information systems auditors
Chief information security officers
Manager information security
Manager cyber security
Information system managers
Candidates aspiring for CISA certification


Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction