13.12.2022, 19:26
Technology Systems Auditing (Part 1 Of 2)
Last updated 9/2019
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 12.89 GB | Duration: 11h 7m
Technology Systems Auditing Training Course
What you'll learn
IT audit process
IT governance
Systems and infrastructure lifecycle management
IT service delivery and support
Protection of information assets
Business continuity and disaster recovery
Requirements
The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.
Description
The IT Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.If you're a professional with experience of participating, leading and directing information system projects, this online IT Systems Auditing course will help you prepare for a lucrative and highly sought after position in this exciting and challenging field of information technology. Completing this course showcases your knowledge of IS auditing, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within an enterprise. After completing this training course you will be able to leverage standards, manage vulnerabilities, you will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise, and the Acquisition process and testing process.IT Systems Auditing is one of the most popular and high-demand IT employment options available. The course offers the ability for students to gain comprehensive knowledge in concepts that are required to get into the field of IT Systems Auditing. Get your start in the world of IT Systems Auditing by taking this course today. Part 2 of this course is also available to complete your education. This course is in no way sponsored or endorsed by, or in any way affiliated with, ISACA.
Overview
Section 1: Module 01 -The Process of Auditing Information Systems
Lecture 1 Introduction
Lecture 2 Lesson 1: Management of the Audit Function
Lecture 3 Organization of the IS Audit Function
Lecture 4 IS Audit Resource Management
Lecture 5 Audit Planning Part1
Lecture 6 Audit Planning Part2
Lecture 7 Audit Planning Part3
Lecture 8 Audit Planning Part4
Lecture 9 Audit Planning Part5
Lecture 10 Effect of Laws and Regulations on IS Audit Planning Part1
Lecture 11 Effect of Laws and Regulations on IS Audit Planning Part2
Lecture 12 Effect of Laws and Regulations on IS Audit Planning Part3
Lecture 13 Effect of Laws and Regulations on IS Audit Planning Part4
Lecture 14 Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
Lecture 15 IT Audit and Assurance Standards and Guidelines Part2
Lecture 16 IT Audit and Assurance Standards and Guidelines Part3
Lecture 17 IT Audit and Assurance Standards and Guidelines Part4
Lecture 18 IT Audit And Assurance Standards Framework
Lecture 19 Auditing Standards Part1
Lecture 20 Auditing Standards Part2
Lecture 21 Auditing Standards Part3
Lecture 22 Auditing Standards Part4
Lecture 23 Auditing Standards Part5
Lecture 24 Auditing Standards Part6
Lecture 25 Auditing Standards Part7
Lecture 26 Auditing Standards Part8
Lecture 27 Auditing Standards Part9
Lecture 28 Audit Guidelines Part1
Lecture 29 Audit Guidelines Part2
Lecture 30 Audit Guidelines Part3
Lecture 31 Audit Guidelines Part4
Lecture 32 Audit Guidelines Part5
Lecture 33 Audit Guidelines Part6
Lecture 34 Audit Guidelines Part7
Lecture 35 Audit Guidelines Part8
Lecture 36 Audit Guidelines Part9
Lecture 37 Audit Guidelines Part10
Lecture 38 Audit Guidelines Part11
Lecture 39 Audit Guidelines Part12
Lecture 40 Audit and Assurance Tools and Techniques
Lecture 41 Relationship Among Standards, Guidelines, and Tools and Techniques
Lecture 42 Information Technology Assurance Framework
Lecture 43 Information Technology Assurance Framework Components
Lecture 44 ITAF General Standards (Section 2200) Part1
Lecture 45 ITAF General Standards (Section 2200) Part2
Lecture 46 ITAF Performance Standards (Section 2400) Part1
Lecture 47 ITAF Performance Standards (Section 2400) Part2
Lecture 48 ITAF Performance Standards (Section 2400) Part3
Lecture 49 ITAF Performance Standards (Section 2400) Part4
Lecture 50 Reporting Standards (Section 2600) Part1
Lecture 51 Reporting Standards (Section 2600) Part2
Lecture 52 Reporting Standards (Section 2600) Part3
Lecture 53 IT Assurance Guidelines (Section 3000) Part1
Lecture 54 IT Assurance Guidelines (Section 3000) Part2
Lecture 55 IT Assurance Guidelines (Section 3000) Part3
Lecture 56 IT Assurance Guidelines (Section 3000) Part4
Lecture 57 IT Assurance Guidelines (Section 3000) Part5
Lecture 58 IT Assurance Guidelines (Section 3000) Part6
Lecture 59 IT Assurance Guidelines (Section 3000) Part7
Lecture 60 IT Assurance Guidelines (Section 3000) Part8
Lecture 61 IT Assurance Guidelines (Section 3000) Part9
Lecture 62 IT Assurance Guidelines (Section 3000) Part10
Lecture 63 IT Assurance Guidelines (Section 3000) Part11
Lecture 64 Lesson 3: Risk Analysis
Lecture 65 Risk Analysis Part1
Lecture 66 Risk Analysis Part2
Lecture 67 Risk Analysis Part3
Lecture 68 Risk Analysis Part4
Lecture 69 Risk Analysis Part5
Lecture 70 Risk Analysis Part6
Lecture 71 Risk Analysis Part7
Lecture 72 Lesson 4: Internal Controls
Lecture 73 Internal Control Objectives
Lecture 74 IS Control Objectives Part1
Lecture 75 IS Control Objectives Part2
Lecture 76 IS Control Objectives Part3
Lecture 77 COBIT
Lecture 78 General Controls Part1
Lecture 79 General Controls Part2
Lecture 80 IS Controls
Lecture 81 Lesson 5: Performing An IS Audit
Lecture 82 Performing an IS Audit
Lecture 83 Classification of Audits
Lecture 84 Audit Programs Part1
Lecture 85 Audit Programs Part2
Lecture 86 Audit Methodology Part1
Lecture 87 Audit Methodology Part2
Lecture 88 Audit Methodology Part3
Lecture 89 Fraud Detection Part1
Lecture 90 Fraud Detection Part2
Lecture 91 Risk-Based Auditing Part1
Lecture 92 Risk-Based Auditing Part2
Lecture 93 Risk-Based Auditing Part3
Lecture 94 Audit Risk and Materiality Part1
Lecture 95 Audit Risk and Materiality Part2
Lecture 96 Audit Risk and Materiality Part3
Lecture 97 Audit Risk and Materiality Part4
Lecture 98 Audit Risk and Materiality Part5
Lecture 99 Risk Assessment and Treatment Part1
Lecture 100 Risk Assessment and Treatment Part2
Lecture 101 Risk Assessment and Treatment Part3
Lecture 102 Risk Assessment and Treatment Part4
Lecture 103 Risk Assessment and Treatment Part5
Lecture 104 Risk Assessment Techniques Part1
Lecture 105 Risk Assessment Techniques Part2
Lecture 106 Risk Assessment Techniques Part3
Lecture 107 Risk Assessment Techniques Part4
Lecture 108 Audit Objectives Part1
Lecture 109 Audit Objectives Part2
Lecture 110 Compliance Versus Substantive Testing Part1
Lecture 111 Compliance Versus Substantive Testing Part2
Lecture 112 Compliance Versus Substantive Testing Part3
Lecture 113 Evidence Part1
Lecture 114 Evidence Part2
Lecture 115 Evidence Part3
Lecture 116 Interviewing and Observing Personnel in the Performance Of Their Duties
Lecture 117 Sampling Part1
Lecture 118 Sampling Part2
Lecture 119 Sampling Part3
Lecture 120 Using The Services Of Other Auditors And Experts Part1
Lecture 121 Using The Services Of Other Auditors And Experts Part2
Lecture 122 Computer-Assisted Audit Techniques (CAAT) Part1
Lecture 123 Computer-Assisted Audit Techniques (CAAT) Part2
Lecture 124 Evaluation Of Audit Strengths And Weaknesses Part1
Lecture 125 Evaluation Of Audit Strengths And Weaknesses Part2
Lecture 126 Evaluation Of Audit Strengths And Weaknesses Part3
Lecture 127 Communicating Audit Results Part1
Lecture 128 Communicating Audit Results Part2
Lecture 129 Communicating Audit Results Part3
Lecture 130 Management Implementation Of Recommendations
Lecture 131 Audit Documentation
Lecture 132 Lesson 6: Control Self-Assessment Part1
Lecture 133 Control Self-Assessment Part2
Lecture 134 Control Self-Assessment Part3
Lecture 135 Objectives of CSA
Lecture 136 Benefits of CSA
Lecture 137 Disadvantages of CSA
Lecture 138 Auditor Role in CSA
Lecture 139 Technology Drivers for CSA
Lecture 140 Traditional Versus CSA Approach
Lecture 141 Lesson 7: The Evolving IS Audit Process
Lecture 142 Automated Work Papers Part1
Lecture 143 Automated Work Papers Part2
Lecture 144 Integrated Auditing Part1
Lecture 145 Integrated Auditing Part2
Lecture 146 Integrated Auditing Part3
Lecture 147 Continuous Auditing Part1
Lecture 148 Continuous Auditing Part2
Lecture 149 Continuous Auditing Part3
Lecture 150 Continuous Auditing Part4
Lecture 151 Continuous Auditing Part5
Lecture 152 Module 01 Review
Section 2: Module 02 - Governance and Management of IT
Lecture 153 Introduction
Lecture 154 Lesson 1: Corporate Governance
Lecture 155 Corporate Governance Part1
Lecture 156 Corporate Governance Part2
Lecture 157 Corporate Governance Part3
Lecture 158 Lesson 2: IT Governance
Lecture 159 IT Governance Part1
Lecture 160 IT Governance Part2
Lecture 161 Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
Lecture 162 IT Monitoring and Assurance Practices for Board and Senior Management Part1
Lecture 163 IT Monitoring and Assurance Practices for Board and Senior Management Part2
Lecture 164 IT Monitoring and Assurance Practices for Board and Senior Management Part3
Lecture 165 Best Practices for IT Governance Part1
Lecture 166 Best Practices for IT Governance Part2
Lecture 167 Best Practices for IT Governance Part3
Lecture 168 Best Practices for IT Governance Part4
Lecture 169 IT Governance Frameworks
Lecture 170 Audit Role in IT Governance Part1
Lecture 171 Audit Role in IT Governance Part2
Lecture 172 Audit Role in IT Governance Part3
Lecture 173 Audit Role in IT Governance Part4
Lecture 174 IT Strategy Committee
Lecture 175 IT Balanced Scorecard Part1
Lecture 176 IT Balanced Scorecard Part2
Lecture 177 Information Security Governance Part1
Lecture 178 Information Security Governance Part2
Lecture 179 Information Security Governance Part3
Lecture 180 Information Security Governance Part4
Lecture 181 Importance of Information Security Governance Part1
Lecture 182 Importance of Information Security Governance Part2
Lecture 183 Outcomes of Security Governance Part1
Lecture 184 Outcomes of Security Governance Part2
Lecture 185 Effective Information Security Governance
Lecture 186 Roles and Responsibilities of Senior Management and Board of Directors Part1
Lecture 187 Roles and Responsibilities of Senior Management and Board of Directors Part2
Lecture 188 Enterprise Architecture
Lecture 189 Lesson 4: Information Systems Strategy
Lecture 190 Strategic Planning Part1
Lecture 191 Strategic Planning Part2
Lecture 192 Steering Committee
Lecture 193 Lesson 5: Maturity and Process Improvement Models
Lecture 194 Maturity and Process Improvement Models
Lecture 195 Lesson 6: IT Investment and Allocation Practices
Lecture 196 IT Investment and Allocation Practices Part1
Lecture 197 IT Investment and Allocation Practices Part2
Lecture 198 IT Investment and Allocation Practices Part3
Lecture 199 IT Investment and Allocation Practices Part4
Lecture 200 Implement IT Portfolio Management
Lecture 201 IT Portfolio Management Versus Balanced Scorecard
Lecture 202 Lesson 7: Policies and Procedures
Lecture 203 Policies Part1
Lecture 204 Policies Part2
Lecture 205 Policies Part3
Lecture 206 Information Security Policy Part1
Lecture 207 Information Security Policy Part2
Lecture 208 Information Security Policy Part3
Lecture 209 Information Security Policy Part4
Lecture 210 Information Security Policy Part5
Lecture 211 Information Security Policy Part6
Lecture 212 Information Security Policy Part7
Lecture 213 Procedures Part1
Lecture 214 Procedures Part2
Lecture 215 Lesson 8: Risk Management
Lecture 216 Risk Management
Lecture 217 Developing a Risk Management Program
Lecture 218 Risk Management Process Part1
Lecture 219 Risk Management Process Part2
Lecture 220 Risk Management Process Part3
Lecture 221 Risk Management Process Part4
Lecture 222 Risk Management Process Part5
Lecture 223 Risk Management Process Part6
Lecture 224 Risk Analysis Methods Part1
Lecture 225 Risk Analysis Methods Part2
Lecture 226 Risk Analysis Methods Part3
Lecture 227 Risk Analysis Methods Part4
Lecture 228 Risk Analysis Methods Part5
Lecture 229 Lesson 9: IS Management Practices
Lecture 230 Human Resource Management Part1
Lecture 231 Human Resource Management Part2
Lecture 232 Human Resource Management Part3
Lecture 233 Human Resource Management Part4
Lecture 234 Human Resource Management Part5
Lecture 235 Human Resource Management Part6
Lecture 236 Human Resource Management Part7
Lecture 237 Human Resource Management Part8
Lecture 238 Human Resource Management Part9
Lecture 239 Human Resource Management Part10
Lecture 240 Human Resource Management Part11
Lecture 241 Human Resource Management Part12
Lecture 242 Human Resource Management Part13
Lecture 243 Human Resource Management Part14
Lecture 244 Organizational Change Management
Lecture 245 Financial Management Practices
Lecture 246 Quality Management Part1
Lecture 247 Quality Management Part2
Lecture 248 Quality Management Part3
Lecture 249 Information Security Management
Lecture 250 Performance Optimization Part1
Lecture 251 Performance Optimization Part2
Lecture 252 Performance Optimization Part3
Lecture 253 Lesson 10: IS Organizational Structure and Responsibilities
Lecture 254 IS Roles and Responsibilities Part1
Lecture 255 IS Roles and Responsibilities Part2
Lecture 256 IS Roles and Responsibilities Part3
Lecture 257 Segregation of Duties
Lecture 258 Segregation of Duties Controls Part1
Lecture 259 Segregation of Duties Controls Part2
Lecture 260 Compensating Controls for Lack of Segregation
Lecture 261 Lesson 11: Auditing IT Governance Structure and Implementation
Lecture 262 Reviewing Documentation Part1
Lecture 263 Reviewing Documentation Part2
Lecture 264 Reviewing Contractual Commitments
Lecture 265 Lesson 12: Business Continuity Planning Part1
Lecture 266 Business Continuity Planning Part2
Lecture 267 Business Continuity Planning Part3
Lecture 268 IS Business Continuity Planning
Lecture 269 Disasters and Other Disruptive Events Part1
Lecture 270 Disasters and Other Disruptive Events Part2
Lecture 271 Business Continuity Planning Process
Lecture 272 Business Continuity Policy
Lecture 273 Business Impact Analysis Part1
Lecture 274 Business Impact Analysis Part2
Lecture 275 Classification of Operations and Criticality Analysis
Lecture 276 Development of Business Continuity Plans
Lecture 277 Other Issues and Plan Development
Lecture 278 Components of a BCP Part1
Lecture 279 Components of a BCP Part2
Lecture 280 BCP Testing Part1
Lecture 281 BCP Testing Part2
Lecture 282 BCP Testing Part3
Lecture 283 BCP Maintenance
Lecture 284 Summary of BCP
Lecture 285 Module 02 Review
Section 3: Module 03 - Information Systems Acquisition, Development and Implementation
Lecture 286 Lesson 1: Business Realization Part1
Lecture 287 Business Realization Part2
Lecture 288 Portfolio/Program Management Part1
Lecture 289 Portfolio/Program Management Part2
Lecture 290 Portfolio/Program Management Part3
Lecture 291 Portfolio/Program Management Part4
Lecture 292 Portfolio/Program Management Part5
Lecture 293 Business Case Development and Approval Part1
Lecture 294 Business Case Development and Approval Part2
Lecture 295 Benefits Realization Techniques
Lecture 296 Lesson 2: Project Management Structure
Lecture 297 Project Context and Environment
Lecture 298 Project Organizational Forms Part1
Lecture 299 Project Organizational Forms Part2
Lecture 300 Project Communication and Culture
Lecture 301 Project Objectives Part1
Lecture 302 Project Objectives Part2
Lecture 303 Project Objectives Part3
Lecture 304 Roles and Responsibilities of Groups and Individuals Part1
Lecture 305 Roles and Responsibilities of Groups and Individuals Part2
Lecture 306 Roles and Responsibilities of Groups and Individuals Part3
Lecture 307 Lesson 3: Project Management Practices
Lecture 308 Initiation of a Project
Lecture 309 Project Planning
Lecture 310 Example of Project Management for New Software
Lecture 311 Software Size Estimation
Lecture 312 Lines of Source Code
Lecture 313 Function Point Analysis (FPA)
Lecture 314 Function Points
Lecture 315 Cost Budgets
Lecture 316 Software Cost Estimation
Lecture 317 Scheduling and Establishing the Timeframe
Lecture 318 Critical Path Methodology
Lecture 319 Gantt Charts
Lecture 320 Program Evaluation Review Technique (PERT)
Lecture 321 Time Box Management
Lecture 322 General Project Management
Lecture 323 Project Controlling Part1
Lecture 324 Project Controlling Part2
Lecture 325 Management of Resource Usage
Lecture 326 Management of Risk Part1
Lecture 327 Management of Risk Part2
Lecture 328 Closing a Project
Lecture 329 Lesson 4: Business Application Development Part1
Lecture 330 Business Application Development Part2
Lecture 331 Business Application Development Part3
Lecture 332 Business Application Development Part4
Lecture 333 Business Application Development Part5
Lecture 334 Traditional SDLC Approach
Lecture 335 SDLC Phases
Lecture 336 SDLC
Lecture 337 Integrated Resource Management Systems Part1
Lecture 338 Integrated Resource Management Systems Part2
Lecture 339 Integrated Resource Management Systems Part3
Lecture 340 Description of SDLC Phases Part1
Lecture 341 Description of SDLC Phases Part2
Lecture 342 Description of SDLC Phases Part3
Lecture 343 Description of SDLC Phases Part4
Lecture 344 Description of SDLC Phases Part5
Lecture 345 Description of SDLC Phases Part6
Lecture 346 Description of SDLC Phases Part7
Lecture 347 Description of SDLC Phases Part8
Lecture 348 Description of SDLC Phases Part9
Lecture 349 Description of SDLC Phases Part10
Lecture 350 Description of SDLC Phases Part11
Lecture 351 Description of SDLC Phases Part12
Lecture 352 Description of SDLC Phases Part13
Lecture 353 Description of SDLC Phases Part14
Lecture 354 Description of SDLC Phases Part15
Lecture 355 Description of SDLC Phases Part16
Lecture 356 Description of SDLC Phases Part17
Lecture 357 Description of SDLC Phases Part18
Lecture 358 Description of SDLC Phases Part19
Lecture 359 Description of SDLC Phases Part20
Lecture 360 Description of SDLC Phases Part21
Lecture 361 Description of SDLC Phases Part22
Lecture 362 Description of SDLC Phases Part23
Lecture 363 Risks Associated with Software Development Part1
Lecture 364 Risks Associated with Software Development Part2
Lecture 365 Lesson 5: Business Application Systems
Lecture 366 Electronic Commerce
Lecture 367 E-Commerce Models
Lecture 368 E-Commerce Architectures
Lecture 369 E-Commerce Risks
Lecture 370 E-Commerce Requirements
Lecture 371 E-Commerce Audit and Control Issues or Best Practices
Lecture 372 Components of PKI
Lecture 373 Electronic Data Interchange
Lecture 374 General Requirements of EDI
Lecture 375 Traditional EDI
Lecture 376 Web Based EDI
Lecture 377 EDI Risks and Controls
Lecture 378 Controls in EDI Environment Part1
Lecture 379 Controls in EDI Environment Part2
Lecture 380 Controls in EDI Environment Part3
Lecture 381 Controls in EDI Environment Part4
Lecture 382 E-Mail
Lecture 383 E-Mail Security Issues
Lecture 384 Standards for E-Mail Security Part1
Lecture 385 Standards for E-Mail Security Part2
Lecture 386 Standards for E-Mail Security Part3
Lecture 387 Point-Of-Sale Systems (POS)
Lecture 388 Electronic Banking Part1
Lecture 389 Electronic Banking Part2
Lecture 390 Risk Management Challenges in E-Banking
Lecture 391 Risk Management Controls for E-Banking Part1
Lecture 392 Risk Management Controls for E-Banking Part2
Lecture 393 Electronic Finance
Lecture 394 Payment Systems
Lecture 395 Electronic Money Model
Lecture 396 Electronic Checks Model
Lecture 397 Electronic Transfer Model
Lecture 398 Electronic Funds Transfer
Lecture 399 Controls in an EFT Environment Part1
Lecture 400 Controls in an EFT Environment Part2
Lecture 401 Automated Teller Machines Part1
Lecture 402 Automated Teller Machines Part2
Lecture 403 Image Processing Part1
Lecture 404 Image Processing Part2
Lecture 405 Business Intelligence
Lecture 406 Decision Support System (DSS)
Lecture 407 DSS Frameworks
Lecture 408 Customer Relation Management (CRM)
Lecture 409 Supply Chain Management (SCM)
Lecture 410 Lesson 6: Alternative Forms of Software Project Organization Part1
Lecture 411 Alternative Forms of Software Project Organization Part2
Lecture 412 Alternative Forms of Software Project Organization Part3
Lecture 413 Agile Development
Lecture 414 Prototyping
Lecture 415 Rapid Application Development (RAD)
Lecture 416 Lesson 7: Alternative Development Methods
Lecture 417 Data Oriented System Development
Lecture 418 Object Oriented System Development Part1
Lecture 419 Object Oriented System Development Part2
Lecture 420 Component-Based Development
Lecture 421 Web-Based Application Development
Lecture 422 Software Reengineering
Lecture 423 Reverse Engineering
Lecture 424 Lesson 8: Infrastructure Development/Acquisition Practices Part1
Lecture 425 Infrastructure Development/Acquisition Practices Part2
Lecture 426 Infrastructure Development/Acquisition Practices Part3
Lecture 427 Project Phases of Physical Architecture Analysis Part1
Lecture 428 Project Phases of Physical Architecture Analysis Part2
Lecture 429 Planning Implementation of Infrastructure Part1
Lecture 430 Planning Implementation of Infrastructure Part2
Lecture 431 Critical Success Factors
Lecture 432 Hardware Acquisition
Lecture 433 Acquisition Steps Part1
Lecture 434 Acquisition Steps Part2
Lecture 435 System Software Acquisition
Lecture 436 System Software Implementation
Lecture 437 System Software Change Control Procedures
Lecture 438 Lesson 9: Information Systems Maintenance Practices
Lecture 439 Change Management Process Overview
Lecture 440 Deploying Changes
Lecture 441 Documentation
Lecture 442 Testing Changed Programs
Lecture 443 Auditing Program Changes
Lecture 444 Emergency Changes
Lecture 445 Change Exposures (Unauthorized Changes)
Lecture 446 Configuration Management Part1
Lecture 447 Configuration Management Part2
Lecture 448 Lesson 10: System Development Tools And Productivity Aids
Lecture 449 Code Generators
Lecture 450 Computer Aided Software Engineering Part1
Lecture 451 Computer Aided Software Engineering Part2
Lecture 452 Computer Aided Software Engineering Part3
Lecture 453 Fourth-Generation Languages (4GL) Part1
Lecture 454 Fourth-Generation Languages (4GL) Part2
Lecture 455 Lesson 11: Business Process Reengineering And Process Change Projects
Lecture 456 Business Process Reengineering And Process Change Projects Continued
Lecture 457 Benchmarking Process Part1
Lecture 458 Benchmarking Process Part2
Lecture 459 The Benchmarking Process
Lecture 460 ISO 9126
Lecture 461 Software Capability Maturity Model
Lecture 462 ISO 15504
Lecture 463 Lesson 12: Application Controls
Lecture 464 Inputs Controls Part1
Lecture 465 Inputs Controls Part2
Lecture 466 Inputs Controls Part3
Lecture 467 Inputs Controls Part4
Lecture 468 Processing Procedures And Controls
Lecture 469 Processing Controls
Lecture 470 Data File Control Procedures
Lecture 471 Output Controls Part1
Lecture 472 Output Controls Part2
Lecture 473 Business Process Control Assurance
Lecture 474 Lesson 13: Auditing Application Controls Part1
Lecture 475 Auditing Application Controls Part2
Lecture 476 Risk Assessment Model To Analyze Application Controls
Lecture 477 Observing And Testing User Performing Procedures
Lecture 478 Data Integrity Testing
Lecture 479 Example Of Referential And Relational Integrity
Lecture 480 Data Integrity In Online Transaction Processing Systems
Lecture 481 Test Application Systems
Lecture 482 Continuous Online Auditing
Lecture 483 Online Auditing Techniques
Lecture 484 Lesson 14: Auditing Systems Development, Acquisition And Maintenance
Lecture 485 Project Management
Lecture 486 Feasibility Study
Lecture 487 Requirements Definition
Lecture 488 Software Acquisition Process
Lecture 489 Detailed Design And Development
Lecture 490 Testing
Lecture 491 Implementation Phase
Lecture 492 Post Implementation Review
Lecture 493 System Change Procedures And The Program Migration Process
Lecture 494 Module 03 Review
Section 4: Module 04 - Information Systems Operations, Maintenance and Support
Lecture 495 Introduction
Lecture 496 Lesson 1: Information Systems Operations
Lecture 497 Management of IS Operations
Lecture 498 Service Management Part1
Lecture 499 Service Management Part2
Lecture 500 Service Management Part3
Lecture 501 Service Management Part4
Lecture 502 Service Management Part5
Lecture 503 Service Level Part1
Lecture 504 Service Level Part2
Lecture 505 Infrastructure Operations
Lecture 506 Scheduling Part1
Lecture 507 Scheduling Part2
Lecture 508 Monitoring Use of Resources
Lecture 509 Process of Incident Handling
Lecture 510 Problem Management
Lecture 511 Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions
Lecture 512 Support/Helpdesk Part1
Lecture 513 Support/Helpdesk Part2
Lecture 514 Change Management Process Part1
Lecture 515 Change Management Process Part2
Lecture 516 Release Management Part1
Lecture 517 Release Management Part2
Lecture 518 Information Security Management
Lecture 519 Media Sanitization
Lecture 520 Lesson 2: Information Systems Hardware
Lecture 521 Computer Hardware Components and Architecture
Lecture 522 Common Enterprise Backend Devices
Lecture 523 Specialized Devices
Lecture 524 Risks
Lecture 525 Security Control
Lecture 526 Radiofrequency Identification
Lecture 527 RFID Applications
Lecture 528 RFID Risks
Lecture 529 RFID Security Control
Lecture 530 Hardware Maintenance Program
Lecture 531 Hardware Monitoring Procedures
Lecture 532 Capacity Management Part1
Lecture 533 Capacity Management Part2
IT audit, control, assurance, and security professionals,IT consultants, auditors, and managers,Security policy writers,Privacy officers,Information security officers,Network and system administrators,Network security engineers
Homepage