Themabewertung:
  • 0 Bewertung(en) - 0 im Durchschnitt
  • 1
  • 2
  • 3
  • 4
  • 5
Technology Systems Auditing (Part 1 Of 2)
#1
[Bild: mw4ayivcjzygenpsmtrl2ygdqd.jpg]

Technology Systems Auditing (Part 1 Of 2)
Last updated 9/2019
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 12.89 GB | Duration: 11h 7m

Technology Systems Auditing Training Course



What you'll learn
IT audit process
IT governance
Systems and infrastructure lifecycle management
IT service delivery and support
Protection of information assets
Business continuity and disaster recovery

Requirements
The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.

Description
The IT Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.If you're a professional with experience of participating, leading and directing information system projects, this online IT Systems Auditing course will help you prepare for a lucrative and highly sought after position in this exciting and challenging field of information technology. Completing this course showcases your knowledge of IS auditing, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within an enterprise. After completing this training course you will be able to leverage standards, manage vulnerabilities, you will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise, and the Acquisition process and testing process.IT Systems Auditing is one of the most popular and high-demand IT employment options available. The course offers the ability for students to gain comprehensive knowledge in concepts that are required to get into the field of IT Systems Auditing. Get your start in the world of IT Systems Auditing by taking this course today. Part 2 of this course is also available to complete your education. This course is in no way sponsored or endorsed by, or in any way affiliated with, ISACA.

Overview

Section 1: Module 01 -The Process of Auditing Information Systems

Lecture 1 Introduction

Lecture 2 Lesson 1: Management of the Audit Function

Lecture 3 Organization of the IS Audit Function

Lecture 4 IS Audit Resource Management

Lecture 5 Audit Planning Part1

Lecture 6 Audit Planning Part2

Lecture 7 Audit Planning Part3

Lecture 8 Audit Planning Part4

Lecture 9 Audit Planning Part5

Lecture 10 Effect of Laws and Regulations on IS Audit Planning Part1

Lecture 11 Effect of Laws and Regulations on IS Audit Planning Part2

Lecture 12 Effect of Laws and Regulations on IS Audit Planning Part3

Lecture 13 Effect of Laws and Regulations on IS Audit Planning Part4

Lecture 14 Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1

Lecture 15 IT Audit and Assurance Standards and Guidelines Part2

Lecture 16 IT Audit and Assurance Standards and Guidelines Part3

Lecture 17 IT Audit and Assurance Standards and Guidelines Part4

Lecture 18 IT Audit And Assurance Standards Framework

Lecture 19 Auditing Standards Part1

Lecture 20 Auditing Standards Part2

Lecture 21 Auditing Standards Part3

Lecture 22 Auditing Standards Part4

Lecture 23 Auditing Standards Part5

Lecture 24 Auditing Standards Part6

Lecture 25 Auditing Standards Part7

Lecture 26 Auditing Standards Part8

Lecture 27 Auditing Standards Part9

Lecture 28 Audit Guidelines Part1

Lecture 29 Audit Guidelines Part2

Lecture 30 Audit Guidelines Part3

Lecture 31 Audit Guidelines Part4

Lecture 32 Audit Guidelines Part5

Lecture 33 Audit Guidelines Part6

Lecture 34 Audit Guidelines Part7

Lecture 35 Audit Guidelines Part8

Lecture 36 Audit Guidelines Part9

Lecture 37 Audit Guidelines Part10

Lecture 38 Audit Guidelines Part11

Lecture 39 Audit Guidelines Part12

Lecture 40 Audit and Assurance Tools and Techniques

Lecture 41 Relationship Among Standards, Guidelines, and Tools and Techniques

Lecture 42 Information Technology Assurance Framework

Lecture 43 Information Technology Assurance Framework Components

Lecture 44 ITAF General Standards (Section 2200) Part1

Lecture 45 ITAF General Standards (Section 2200) Part2

Lecture 46 ITAF Performance Standards (Section 2400) Part1

Lecture 47 ITAF Performance Standards (Section 2400) Part2

Lecture 48 ITAF Performance Standards (Section 2400) Part3

Lecture 49 ITAF Performance Standards (Section 2400) Part4

Lecture 50 Reporting Standards (Section 2600) Part1

Lecture 51 Reporting Standards (Section 2600) Part2

Lecture 52 Reporting Standards (Section 2600) Part3

Lecture 53 IT Assurance Guidelines (Section 3000) Part1

Lecture 54 IT Assurance Guidelines (Section 3000) Part2

Lecture 55 IT Assurance Guidelines (Section 3000) Part3

Lecture 56 IT Assurance Guidelines (Section 3000) Part4

Lecture 57 IT Assurance Guidelines (Section 3000) Part5

Lecture 58 IT Assurance Guidelines (Section 3000) Part6

Lecture 59 IT Assurance Guidelines (Section 3000) Part7

Lecture 60 IT Assurance Guidelines (Section 3000) Part8

Lecture 61 IT Assurance Guidelines (Section 3000) Part9

Lecture 62 IT Assurance Guidelines (Section 3000) Part10

Lecture 63 IT Assurance Guidelines (Section 3000) Part11

Lecture 64 Lesson 3: Risk Analysis

Lecture 65 Risk Analysis Part1

Lecture 66 Risk Analysis Part2

Lecture 67 Risk Analysis Part3

Lecture 68 Risk Analysis Part4

Lecture 69 Risk Analysis Part5

Lecture 70 Risk Analysis Part6

Lecture 71 Risk Analysis Part7

Lecture 72 Lesson 4: Internal Controls

Lecture 73 Internal Control Objectives

Lecture 74 IS Control Objectives Part1

Lecture 75 IS Control Objectives Part2

Lecture 76 IS Control Objectives Part3

Lecture 77 COBIT

Lecture 78 General Controls Part1

Lecture 79 General Controls Part2

Lecture 80 IS Controls

Lecture 81 Lesson 5: Performing An IS Audit

Lecture 82 Performing an IS Audit

Lecture 83 Classification of Audits

Lecture 84 Audit Programs Part1

Lecture 85 Audit Programs Part2

Lecture 86 Audit Methodology Part1

Lecture 87 Audit Methodology Part2

Lecture 88 Audit Methodology Part3

Lecture 89 Fraud Detection Part1

Lecture 90 Fraud Detection Part2

Lecture 91 Risk-Based Auditing Part1

Lecture 92 Risk-Based Auditing Part2

Lecture 93 Risk-Based Auditing Part3

Lecture 94 Audit Risk and Materiality Part1

Lecture 95 Audit Risk and Materiality Part2

Lecture 96 Audit Risk and Materiality Part3

Lecture 97 Audit Risk and Materiality Part4

Lecture 98 Audit Risk and Materiality Part5

Lecture 99 Risk Assessment and Treatment Part1

Lecture 100 Risk Assessment and Treatment Part2

Lecture 101 Risk Assessment and Treatment Part3

Lecture 102 Risk Assessment and Treatment Part4

Lecture 103 Risk Assessment and Treatment Part5

Lecture 104 Risk Assessment Techniques Part1

Lecture 105 Risk Assessment Techniques Part2

Lecture 106 Risk Assessment Techniques Part3

Lecture 107 Risk Assessment Techniques Part4

Lecture 108 Audit Objectives Part1

Lecture 109 Audit Objectives Part2

Lecture 110 Compliance Versus Substantive Testing Part1

Lecture 111 Compliance Versus Substantive Testing Part2

Lecture 112 Compliance Versus Substantive Testing Part3

Lecture 113 Evidence Part1

Lecture 114 Evidence Part2

Lecture 115 Evidence Part3

Lecture 116 Interviewing and Observing Personnel in the Performance Of Their Duties

Lecture 117 Sampling Part1

Lecture 118 Sampling Part2

Lecture 119 Sampling Part3

Lecture 120 Using The Services Of Other Auditors And Experts Part1

Lecture 121 Using The Services Of Other Auditors And Experts Part2

Lecture 122 Computer-Assisted Audit Techniques (CAAT) Part1

Lecture 123 Computer-Assisted Audit Techniques (CAAT) Part2

Lecture 124 Evaluation Of Audit Strengths And Weaknesses Part1

Lecture 125 Evaluation Of Audit Strengths And Weaknesses Part2

Lecture 126 Evaluation Of Audit Strengths And Weaknesses Part3

Lecture 127 Communicating Audit Results Part1

Lecture 128 Communicating Audit Results Part2

Lecture 129 Communicating Audit Results Part3

Lecture 130 Management Implementation Of Recommendations

Lecture 131 Audit Documentation

Lecture 132 Lesson 6: Control Self-Assessment Part1

Lecture 133 Control Self-Assessment Part2

Lecture 134 Control Self-Assessment Part3

Lecture 135 Objectives of CSA

Lecture 136 Benefits of CSA

Lecture 137 Disadvantages of CSA

Lecture 138 Auditor Role in CSA

Lecture 139 Technology Drivers for CSA

Lecture 140 Traditional Versus CSA Approach

Lecture 141 Lesson 7: The Evolving IS Audit Process

Lecture 142 Automated Work Papers Part1

Lecture 143 Automated Work Papers Part2

Lecture 144 Integrated Auditing Part1

Lecture 145 Integrated Auditing Part2

Lecture 146 Integrated Auditing Part3

Lecture 147 Continuous Auditing Part1

Lecture 148 Continuous Auditing Part2

Lecture 149 Continuous Auditing Part3

Lecture 150 Continuous Auditing Part4

Lecture 151 Continuous Auditing Part5

Lecture 152 Module 01 Review

Section 2: Module 02 - Governance and Management of IT

Lecture 153 Introduction

Lecture 154 Lesson 1: Corporate Governance

Lecture 155 Corporate Governance Part1

Lecture 156 Corporate Governance Part2

Lecture 157 Corporate Governance Part3

Lecture 158 Lesson 2: IT Governance

Lecture 159 IT Governance Part1

Lecture 160 IT Governance Part2

Lecture 161 Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management

Lecture 162 IT Monitoring and Assurance Practices for Board and Senior Management Part1

Lecture 163 IT Monitoring and Assurance Practices for Board and Senior Management Part2

Lecture 164 IT Monitoring and Assurance Practices for Board and Senior Management Part3

Lecture 165 Best Practices for IT Governance Part1

Lecture 166 Best Practices for IT Governance Part2

Lecture 167 Best Practices for IT Governance Part3

Lecture 168 Best Practices for IT Governance Part4

Lecture 169 IT Governance Frameworks

Lecture 170 Audit Role in IT Governance Part1

Lecture 171 Audit Role in IT Governance Part2

Lecture 172 Audit Role in IT Governance Part3

Lecture 173 Audit Role in IT Governance Part4

Lecture 174 IT Strategy Committee

Lecture 175 IT Balanced Scorecard Part1

Lecture 176 IT Balanced Scorecard Part2

Lecture 177 Information Security Governance Part1

Lecture 178 Information Security Governance Part2

Lecture 179 Information Security Governance Part3

Lecture 180 Information Security Governance Part4

Lecture 181 Importance of Information Security Governance Part1

Lecture 182 Importance of Information Security Governance Part2

Lecture 183 Outcomes of Security Governance Part1

Lecture 184 Outcomes of Security Governance Part2

Lecture 185 Effective Information Security Governance

Lecture 186 Roles and Responsibilities of Senior Management and Board of Directors Part1

Lecture 187 Roles and Responsibilities of Senior Management and Board of Directors Part2

Lecture 188 Enterprise Architecture

Lecture 189 Lesson 4: Information Systems Strategy

Lecture 190 Strategic Planning Part1

Lecture 191 Strategic Planning Part2

Lecture 192 Steering Committee

Lecture 193 Lesson 5: Maturity and Process Improvement Models

Lecture 194 Maturity and Process Improvement Models

Lecture 195 Lesson 6: IT Investment and Allocation Practices

Lecture 196 IT Investment and Allocation Practices Part1

Lecture 197 IT Investment and Allocation Practices Part2

Lecture 198 IT Investment and Allocation Practices Part3

Lecture 199 IT Investment and Allocation Practices Part4

Lecture 200 Implement IT Portfolio Management

Lecture 201 IT Portfolio Management Versus Balanced Scorecard

Lecture 202 Lesson 7: Policies and Procedures

Lecture 203 Policies Part1

Lecture 204 Policies Part2

Lecture 205 Policies Part3

Lecture 206 Information Security Policy Part1

Lecture 207 Information Security Policy Part2

Lecture 208 Information Security Policy Part3

Lecture 209 Information Security Policy Part4

Lecture 210 Information Security Policy Part5

Lecture 211 Information Security Policy Part6

Lecture 212 Information Security Policy Part7

Lecture 213 Procedures Part1

Lecture 214 Procedures Part2

Lecture 215 Lesson 8: Risk Management

Lecture 216 Risk Management

Lecture 217 Developing a Risk Management Program

Lecture 218 Risk Management Process Part1

Lecture 219 Risk Management Process Part2

Lecture 220 Risk Management Process Part3

Lecture 221 Risk Management Process Part4

Lecture 222 Risk Management Process Part5

Lecture 223 Risk Management Process Part6

Lecture 224 Risk Analysis Methods Part1

Lecture 225 Risk Analysis Methods Part2

Lecture 226 Risk Analysis Methods Part3

Lecture 227 Risk Analysis Methods Part4

Lecture 228 Risk Analysis Methods Part5

Lecture 229 Lesson 9: IS Management Practices

Lecture 230 Human Resource Management Part1

Lecture 231 Human Resource Management Part2

Lecture 232 Human Resource Management Part3

Lecture 233 Human Resource Management Part4

Lecture 234 Human Resource Management Part5

Lecture 235 Human Resource Management Part6

Lecture 236 Human Resource Management Part7

Lecture 237 Human Resource Management Part8

Lecture 238 Human Resource Management Part9

Lecture 239 Human Resource Management Part10

Lecture 240 Human Resource Management Part11

Lecture 241 Human Resource Management Part12

Lecture 242 Human Resource Management Part13

Lecture 243 Human Resource Management Part14

Lecture 244 Organizational Change Management

Lecture 245 Financial Management Practices

Lecture 246 Quality Management Part1

Lecture 247 Quality Management Part2

Lecture 248 Quality Management Part3

Lecture 249 Information Security Management

Lecture 250 Performance Optimization Part1

Lecture 251 Performance Optimization Part2

Lecture 252 Performance Optimization Part3

Lecture 253 Lesson 10: IS Organizational Structure and Responsibilities

Lecture 254 IS Roles and Responsibilities Part1

Lecture 255 IS Roles and Responsibilities Part2

Lecture 256 IS Roles and Responsibilities Part3

Lecture 257 Segregation of Duties

Lecture 258 Segregation of Duties Controls Part1

Lecture 259 Segregation of Duties Controls Part2

Lecture 260 Compensating Controls for Lack of Segregation

Lecture 261 Lesson 11: Auditing IT Governance Structure and Implementation

Lecture 262 Reviewing Documentation Part1

Lecture 263 Reviewing Documentation Part2

Lecture 264 Reviewing Contractual Commitments

Lecture 265 Lesson 12: Business Continuity Planning Part1

Lecture 266 Business Continuity Planning Part2

Lecture 267 Business Continuity Planning Part3

Lecture 268 IS Business Continuity Planning

Lecture 269 Disasters and Other Disruptive Events Part1

Lecture 270 Disasters and Other Disruptive Events Part2

Lecture 271 Business Continuity Planning Process

Lecture 272 Business Continuity Policy

Lecture 273 Business Impact Analysis Part1

Lecture 274 Business Impact Analysis Part2

Lecture 275 Classification of Operations and Criticality Analysis

Lecture 276 Development of Business Continuity Plans

Lecture 277 Other Issues and Plan Development

Lecture 278 Components of a BCP Part1

Lecture 279 Components of a BCP Part2

Lecture 280 BCP Testing Part1

Lecture 281 BCP Testing Part2

Lecture 282 BCP Testing Part3

Lecture 283 BCP Maintenance

Lecture 284 Summary of BCP

Lecture 285 Module 02 Review

Section 3: Module 03 - Information Systems Acquisition, Development and Implementation

Lecture 286 Lesson 1: Business Realization Part1

Lecture 287 Business Realization Part2

Lecture 288 Portfolio/Program Management Part1

Lecture 289 Portfolio/Program Management Part2

Lecture 290 Portfolio/Program Management Part3

Lecture 291 Portfolio/Program Management Part4

Lecture 292 Portfolio/Program Management Part5

Lecture 293 Business Case Development and Approval Part1

Lecture 294 Business Case Development and Approval Part2

Lecture 295 Benefits Realization Techniques

Lecture 296 Lesson 2: Project Management Structure

Lecture 297 Project Context and Environment

Lecture 298 Project Organizational Forms Part1

Lecture 299 Project Organizational Forms Part2

Lecture 300 Project Communication and Culture

Lecture 301 Project Objectives Part1

Lecture 302 Project Objectives Part2

Lecture 303 Project Objectives Part3

Lecture 304 Roles and Responsibilities of Groups and Individuals Part1

Lecture 305 Roles and Responsibilities of Groups and Individuals Part2

Lecture 306 Roles and Responsibilities of Groups and Individuals Part3

Lecture 307 Lesson 3: Project Management Practices

Lecture 308 Initiation of a Project

Lecture 309 Project Planning

Lecture 310 Example of Project Management for New Software

Lecture 311 Software Size Estimation

Lecture 312 Lines of Source Code

Lecture 313 Function Point Analysis (FPA)

Lecture 314 Function Points

Lecture 315 Cost Budgets

Lecture 316 Software Cost Estimation

Lecture 317 Scheduling and Establishing the Timeframe

Lecture 318 Critical Path Methodology

Lecture 319 Gantt Charts

Lecture 320 Program Evaluation Review Technique (PERT)

Lecture 321 Time Box Management

Lecture 322 General Project Management

Lecture 323 Project Controlling Part1

Lecture 324 Project Controlling Part2

Lecture 325 Management of Resource Usage

Lecture 326 Management of Risk Part1

Lecture 327 Management of Risk Part2

Lecture 328 Closing a Project

Lecture 329 Lesson 4: Business Application Development Part1

Lecture 330 Business Application Development Part2

Lecture 331 Business Application Development Part3

Lecture 332 Business Application Development Part4

Lecture 333 Business Application Development Part5

Lecture 334 Traditional SDLC Approach

Lecture 335 SDLC Phases

Lecture 336 SDLC

Lecture 337 Integrated Resource Management Systems Part1

Lecture 338 Integrated Resource Management Systems Part2

Lecture 339 Integrated Resource Management Systems Part3

Lecture 340 Description of SDLC Phases Part1

Lecture 341 Description of SDLC Phases Part2

Lecture 342 Description of SDLC Phases Part3

Lecture 343 Description of SDLC Phases Part4

Lecture 344 Description of SDLC Phases Part5

Lecture 345 Description of SDLC Phases Part6

Lecture 346 Description of SDLC Phases Part7

Lecture 347 Description of SDLC Phases Part8

Lecture 348 Description of SDLC Phases Part9

Lecture 349 Description of SDLC Phases Part10

Lecture 350 Description of SDLC Phases Part11

Lecture 351 Description of SDLC Phases Part12

Lecture 352 Description of SDLC Phases Part13

Lecture 353 Description of SDLC Phases Part14

Lecture 354 Description of SDLC Phases Part15

Lecture 355 Description of SDLC Phases Part16

Lecture 356 Description of SDLC Phases Part17

Lecture 357 Description of SDLC Phases Part18

Lecture 358 Description of SDLC Phases Part19

Lecture 359 Description of SDLC Phases Part20

Lecture 360 Description of SDLC Phases Part21

Lecture 361 Description of SDLC Phases Part22

Lecture 362 Description of SDLC Phases Part23

Lecture 363 Risks Associated with Software Development Part1

Lecture 364 Risks Associated with Software Development Part2

Lecture 365 Lesson 5: Business Application Systems

Lecture 366 Electronic Commerce

Lecture 367 E-Commerce Models

Lecture 368 E-Commerce Architectures

Lecture 369 E-Commerce Risks

Lecture 370 E-Commerce Requirements

Lecture 371 E-Commerce Audit and Control Issues or Best Practices

Lecture 372 Components of PKI

Lecture 373 Electronic Data Interchange

Lecture 374 General Requirements of EDI

Lecture 375 Traditional EDI

Lecture 376 Web Based EDI

Lecture 377 EDI Risks and Controls

Lecture 378 Controls in EDI Environment Part1

Lecture 379 Controls in EDI Environment Part2

Lecture 380 Controls in EDI Environment Part3

Lecture 381 Controls in EDI Environment Part4

Lecture 382 E-Mail

Lecture 383 E-Mail Security Issues

Lecture 384 Standards for E-Mail Security Part1

Lecture 385 Standards for E-Mail Security Part2

Lecture 386 Standards for E-Mail Security Part3

Lecture 387 Point-Of-Sale Systems (POS)

Lecture 388 Electronic Banking Part1

Lecture 389 Electronic Banking Part2

Lecture 390 Risk Management Challenges in E-Banking

Lecture 391 Risk Management Controls for E-Banking Part1

Lecture 392 Risk Management Controls for E-Banking Part2

Lecture 393 Electronic Finance

Lecture 394 Payment Systems

Lecture 395 Electronic Money Model

Lecture 396 Electronic Checks Model

Lecture 397 Electronic Transfer Model

Lecture 398 Electronic Funds Transfer

Lecture 399 Controls in an EFT Environment Part1

Lecture 400 Controls in an EFT Environment Part2

Lecture 401 Automated Teller Machines Part1

Lecture 402 Automated Teller Machines Part2

Lecture 403 Image Processing Part1

Lecture 404 Image Processing Part2

Lecture 405 Business Intelligence

Lecture 406 Decision Support System (DSS)

Lecture 407 DSS Frameworks

Lecture 408 Customer Relation Management (CRM)

Lecture 409 Supply Chain Management (SCM)

Lecture 410 Lesson 6: Alternative Forms of Software Project Organization Part1

Lecture 411 Alternative Forms of Software Project Organization Part2

Lecture 412 Alternative Forms of Software Project Organization Part3

Lecture 413 Agile Development

Lecture 414 Prototyping

Lecture 415 Rapid Application Development (RAD)

Lecture 416 Lesson 7: Alternative Development Methods

Lecture 417 Data Oriented System Development

Lecture 418 Object Oriented System Development Part1

Lecture 419 Object Oriented System Development Part2

Lecture 420 Component-Based Development

Lecture 421 Web-Based Application Development

Lecture 422 Software Reengineering

Lecture 423 Reverse Engineering

Lecture 424 Lesson 8: Infrastructure Development/Acquisition Practices Part1

Lecture 425 Infrastructure Development/Acquisition Practices Part2

Lecture 426 Infrastructure Development/Acquisition Practices Part3

Lecture 427 Project Phases of Physical Architecture Analysis Part1

Lecture 428 Project Phases of Physical Architecture Analysis Part2

Lecture 429 Planning Implementation of Infrastructure Part1

Lecture 430 Planning Implementation of Infrastructure Part2

Lecture 431 Critical Success Factors

Lecture 432 Hardware Acquisition

Lecture 433 Acquisition Steps Part1

Lecture 434 Acquisition Steps Part2

Lecture 435 System Software Acquisition

Lecture 436 System Software Implementation

Lecture 437 System Software Change Control Procedures

Lecture 438 Lesson 9: Information Systems Maintenance Practices

Lecture 439 Change Management Process Overview

Lecture 440 Deploying Changes

Lecture 441 Documentation

Lecture 442 Testing Changed Programs

Lecture 443 Auditing Program Changes

Lecture 444 Emergency Changes

Lecture 445 Change Exposures (Unauthorized Changes)

Lecture 446 Configuration Management Part1

Lecture 447 Configuration Management Part2

Lecture 448 Lesson 10: System Development Tools And Productivity Aids

Lecture 449 Code Generators

Lecture 450 Computer Aided Software Engineering Part1

Lecture 451 Computer Aided Software Engineering Part2

Lecture 452 Computer Aided Software Engineering Part3

Lecture 453 Fourth-Generation Languages (4GL) Part1

Lecture 454 Fourth-Generation Languages (4GL) Part2

Lecture 455 Lesson 11: Business Process Reengineering And Process Change Projects

Lecture 456 Business Process Reengineering And Process Change Projects Continued

Lecture 457 Benchmarking Process Part1

Lecture 458 Benchmarking Process Part2

Lecture 459 The Benchmarking Process

Lecture 460 ISO 9126

Lecture 461 Software Capability Maturity Model

Lecture 462 ISO 15504

Lecture 463 Lesson 12: Application Controls

Lecture 464 Inputs Controls Part1

Lecture 465 Inputs Controls Part2

Lecture 466 Inputs Controls Part3

Lecture 467 Inputs Controls Part4

Lecture 468 Processing Procedures And Controls

Lecture 469 Processing Controls

Lecture 470 Data File Control Procedures

Lecture 471 Output Controls Part1

Lecture 472 Output Controls Part2

Lecture 473 Business Process Control Assurance

Lecture 474 Lesson 13: Auditing Application Controls Part1

Lecture 475 Auditing Application Controls Part2

Lecture 476 Risk Assessment Model To Analyze Application Controls

Lecture 477 Observing And Testing User Performing Procedures

Lecture 478 Data Integrity Testing

Lecture 479 Example Of Referential And Relational Integrity

Lecture 480 Data Integrity In Online Transaction Processing Systems

Lecture 481 Test Application Systems

Lecture 482 Continuous Online Auditing

Lecture 483 Online Auditing Techniques

Lecture 484 Lesson 14: Auditing Systems Development, Acquisition And Maintenance

Lecture 485 Project Management

Lecture 486 Feasibility Study

Lecture 487 Requirements Definition

Lecture 488 Software Acquisition Process

Lecture 489 Detailed Design And Development

Lecture 490 Testing

Lecture 491 Implementation Phase

Lecture 492 Post Implementation Review

Lecture 493 System Change Procedures And The Program Migration Process

Lecture 494 Module 03 Review

Section 4: Module 04 - Information Systems Operations, Maintenance and Support

Lecture 495 Introduction

Lecture 496 Lesson 1: Information Systems Operations

Lecture 497 Management of IS Operations

Lecture 498 Service Management Part1

Lecture 499 Service Management Part2

Lecture 500 Service Management Part3

Lecture 501 Service Management Part4

Lecture 502 Service Management Part5

Lecture 503 Service Level Part1

Lecture 504 Service Level Part2

Lecture 505 Infrastructure Operations

Lecture 506 Scheduling Part1

Lecture 507 Scheduling Part2

Lecture 508 Monitoring Use of Resources

Lecture 509 Process of Incident Handling

Lecture 510 Problem Management

Lecture 511 Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions

Lecture 512 Support/Helpdesk Part1

Lecture 513 Support/Helpdesk Part2

Lecture 514 Change Management Process Part1

Lecture 515 Change Management Process Part2

Lecture 516 Release Management Part1

Lecture 517 Release Management Part2

Lecture 518 Information Security Management

Lecture 519 Media Sanitization

Lecture 520 Lesson 2: Information Systems Hardware

Lecture 521 Computer Hardware Components and Architecture

Lecture 522 Common Enterprise Backend Devices

Lecture 523 Specialized Devices

Lecture 524 Risks

Lecture 525 Security Control

Lecture 526 Radiofrequency Identification

Lecture 527 RFID Applications

Lecture 528 RFID Risks

Lecture 529 RFID Security Control

Lecture 530 Hardware Maintenance Program

Lecture 531 Hardware Monitoring Procedures

Lecture 532 Capacity Management Part1

Lecture 533 Capacity Management Part2

IT audit, control, assurance, and security professionals,IT consultants, auditors, and managers,Security policy writers,Privacy officers,Information security officers,Network and system administrators,Network security engineers

Homepage

[Bild: 265lesson12businessco0xd4e.jpg]



Zitieren


Möglicherweise verwandte Themen…
Thema Verfasser Antworten Ansichten Letzter Beitrag
  The complete Guide for 4G and 5G Technology Panter 0 40 04.03.2024, 12:26
Letzter Beitrag: Panter
  Financial Crime: Processes & Technology - Masterclass Panter 0 65 20.08.2023, 21:47
Letzter Beitrag: Panter
  Pharma Product Design, Technology & Commercial Manufacturing Panter 0 56 08.08.2023, 21:31
Letzter Beitrag: Panter
  Part 3 FAA Private Pilot Ground School (Part 61) Panter 0 67 13.07.2023, 02:07
Letzter Beitrag: Panter
  Intro To Music Technology Panter 0 95 20.10.2022, 23:43
Letzter Beitrag: Panter
  Part 4 FAA Private Pilot Ground School (Part 61) Panter 0 163 24.07.2022, 23:38
Letzter Beitrag: Panter

Gehe zu:


Benutzer, die gerade dieses Thema anschauen: 1 Gast/Gäste
Expand chat