Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Technology Systems Auditing (Part 1 Of 2)

    Posted By: ELK1nG
    Technology Systems Auditing (Part 1 Of 2)

    Technology Systems Auditing (Part 1 Of 2)
    Last updated 9/2019
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 12.89 GB | Duration: 11h 7m

    Technology Systems Auditing Training Course

    What you'll learn
    IT audit process
    IT governance
    Systems and infrastructure lifecycle management
    IT service delivery and support
    Protection of information assets
    Business continuity and disaster recovery
    Requirements
    The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
    This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.
    Description
    The IT Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.If you’re a professional with experience of participating, leading and directing information system projects, this online IT Systems Auditing course will help you prepare for a lucrative and highly sought after position in this exciting and challenging field of information technology. Completing this course showcases your knowledge of IS auditing, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within an enterprise. After completing this training course you will be able to leverage standards, manage vulnerabilities, you will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise, and the Acquisition process and testing process.IT Systems Auditing is one of the most popular and high-demand IT employment options available. The course offers the ability for students to gain comprehensive knowledge in concepts that are required to get into the field of IT Systems Auditing. Get your start in the world of IT Systems Auditing by taking this course today. Part 2 of this course is also available to complete your education. This course is in no way sponsored or endorsed by, or in any way affiliated with, ISACA.

    Overview

    Section 1: Module 01 -The Process of Auditing Information Systems

    Lecture 1 Introduction

    Lecture 2 Lesson 1: Management of the Audit Function

    Lecture 3 Organization of the IS Audit Function

    Lecture 4 IS Audit Resource Management

    Lecture 5 Audit Planning Part1

    Lecture 6 Audit Planning Part2

    Lecture 7 Audit Planning Part3

    Lecture 8 Audit Planning Part4

    Lecture 9 Audit Planning Part5

    Lecture 10 Effect of Laws and Regulations on IS Audit Planning Part1

    Lecture 11 Effect of Laws and Regulations on IS Audit Planning Part2

    Lecture 12 Effect of Laws and Regulations on IS Audit Planning Part3

    Lecture 13 Effect of Laws and Regulations on IS Audit Planning Part4

    Lecture 14 Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1

    Lecture 15 IT Audit and Assurance Standards and Guidelines Part2

    Lecture 16 IT Audit and Assurance Standards and Guidelines Part3

    Lecture 17 IT Audit and Assurance Standards and Guidelines Part4

    Lecture 18 IT Audit And Assurance Standards Framework

    Lecture 19 Auditing Standards Part1

    Lecture 20 Auditing Standards Part2

    Lecture 21 Auditing Standards Part3

    Lecture 22 Auditing Standards Part4

    Lecture 23 Auditing Standards Part5

    Lecture 24 Auditing Standards Part6

    Lecture 25 Auditing Standards Part7

    Lecture 26 Auditing Standards Part8

    Lecture 27 Auditing Standards Part9

    Lecture 28 Audit Guidelines Part1

    Lecture 29 Audit Guidelines Part2

    Lecture 30 Audit Guidelines Part3

    Lecture 31 Audit Guidelines Part4

    Lecture 32 Audit Guidelines Part5

    Lecture 33 Audit Guidelines Part6

    Lecture 34 Audit Guidelines Part7

    Lecture 35 Audit Guidelines Part8

    Lecture 36 Audit Guidelines Part9

    Lecture 37 Audit Guidelines Part10

    Lecture 38 Audit Guidelines Part11

    Lecture 39 Audit Guidelines Part12

    Lecture 40 Audit and Assurance Tools and Techniques

    Lecture 41 Relationship Among Standards, Guidelines, and Tools and Techniques

    Lecture 42 Information Technology Assurance Framework

    Lecture 43 Information Technology Assurance Framework Components

    Lecture 44 ITAF General Standards (Section 2200) Part1

    Lecture 45 ITAF General Standards (Section 2200) Part2

    Lecture 46 ITAF Performance Standards (Section 2400) Part1

    Lecture 47 ITAF Performance Standards (Section 2400) Part2

    Lecture 48 ITAF Performance Standards (Section 2400) Part3

    Lecture 49 ITAF Performance Standards (Section 2400) Part4

    Lecture 50 Reporting Standards (Section 2600) Part1

    Lecture 51 Reporting Standards (Section 2600) Part2

    Lecture 52 Reporting Standards (Section 2600) Part3

    Lecture 53 IT Assurance Guidelines (Section 3000) Part1

    Lecture 54 IT Assurance Guidelines (Section 3000) Part2

    Lecture 55 IT Assurance Guidelines (Section 3000) Part3

    Lecture 56 IT Assurance Guidelines (Section 3000) Part4

    Lecture 57 IT Assurance Guidelines (Section 3000) Part5

    Lecture 58 IT Assurance Guidelines (Section 3000) Part6

    Lecture 59 IT Assurance Guidelines (Section 3000) Part7

    Lecture 60 IT Assurance Guidelines (Section 3000) Part8

    Lecture 61 IT Assurance Guidelines (Section 3000) Part9

    Lecture 62 IT Assurance Guidelines (Section 3000) Part10

    Lecture 63 IT Assurance Guidelines (Section 3000) Part11

    Lecture 64 Lesson 3: Risk Analysis

    Lecture 65 Risk Analysis Part1

    Lecture 66 Risk Analysis Part2

    Lecture 67 Risk Analysis Part3

    Lecture 68 Risk Analysis Part4

    Lecture 69 Risk Analysis Part5

    Lecture 70 Risk Analysis Part6

    Lecture 71 Risk Analysis Part7

    Lecture 72 Lesson 4: Internal Controls

    Lecture 73 Internal Control Objectives

    Lecture 74 IS Control Objectives Part1

    Lecture 75 IS Control Objectives Part2

    Lecture 76 IS Control Objectives Part3

    Lecture 77 COBIT

    Lecture 78 General Controls Part1

    Lecture 79 General Controls Part2

    Lecture 80 IS Controls

    Lecture 81 Lesson 5: Performing An IS Audit

    Lecture 82 Performing an IS Audit

    Lecture 83 Classification of Audits

    Lecture 84 Audit Programs Part1

    Lecture 85 Audit Programs Part2

    Lecture 86 Audit Methodology Part1

    Lecture 87 Audit Methodology Part2

    Lecture 88 Audit Methodology Part3

    Lecture 89 Fraud Detection Part1

    Lecture 90 Fraud Detection Part2

    Lecture 91 Risk-Based Auditing Part1

    Lecture 92 Risk-Based Auditing Part2

    Lecture 93 Risk-Based Auditing Part3

    Lecture 94 Audit Risk and Materiality Part1

    Lecture 95 Audit Risk and Materiality Part2

    Lecture 96 Audit Risk and Materiality Part3

    Lecture 97 Audit Risk and Materiality Part4

    Lecture 98 Audit Risk and Materiality Part5

    Lecture 99 Risk Assessment and Treatment Part1

    Lecture 100 Risk Assessment and Treatment Part2

    Lecture 101 Risk Assessment and Treatment Part3

    Lecture 102 Risk Assessment and Treatment Part4

    Lecture 103 Risk Assessment and Treatment Part5

    Lecture 104 Risk Assessment Techniques Part1

    Lecture 105 Risk Assessment Techniques Part2

    Lecture 106 Risk Assessment Techniques Part3

    Lecture 107 Risk Assessment Techniques Part4

    Lecture 108 Audit Objectives Part1

    Lecture 109 Audit Objectives Part2

    Lecture 110 Compliance Versus Substantive Testing Part1

    Lecture 111 Compliance Versus Substantive Testing Part2

    Lecture 112 Compliance Versus Substantive Testing Part3

    Lecture 113 Evidence Part1

    Lecture 114 Evidence Part2

    Lecture 115 Evidence Part3

    Lecture 116 Interviewing and Observing Personnel in the Performance Of Their Duties

    Lecture 117 Sampling Part1

    Lecture 118 Sampling Part2

    Lecture 119 Sampling Part3

    Lecture 120 Using The Services Of Other Auditors And Experts Part1

    Lecture 121 Using The Services Of Other Auditors And Experts Part2

    Lecture 122 Computer-Assisted Audit Techniques (CAAT) Part1

    Lecture 123 Computer-Assisted Audit Techniques (CAAT) Part2

    Lecture 124 Evaluation Of Audit Strengths And Weaknesses Part1

    Lecture 125 Evaluation Of Audit Strengths And Weaknesses Part2

    Lecture 126 Evaluation Of Audit Strengths And Weaknesses Part3

    Lecture 127 Communicating Audit Results Part1

    Lecture 128 Communicating Audit Results Part2

    Lecture 129 Communicating Audit Results Part3

    Lecture 130 Management Implementation Of Recommendations

    Lecture 131 Audit Documentation

    Lecture 132 Lesson 6: Control Self-Assessment Part1

    Lecture 133 Control Self-Assessment Part2

    Lecture 134 Control Self-Assessment Part3

    Lecture 135 Objectives of CSA

    Lecture 136 Benefits of CSA

    Lecture 137 Disadvantages of CSA

    Lecture 138 Auditor Role in CSA

    Lecture 139 Technology Drivers for CSA

    Lecture 140 Traditional Versus CSA Approach

    Lecture 141 Lesson 7: The Evolving IS Audit Process

    Lecture 142 Automated Work Papers Part1

    Lecture 143 Automated Work Papers Part2

    Lecture 144 Integrated Auditing Part1

    Lecture 145 Integrated Auditing Part2

    Lecture 146 Integrated Auditing Part3

    Lecture 147 Continuous Auditing Part1

    Lecture 148 Continuous Auditing Part2

    Lecture 149 Continuous Auditing Part3

    Lecture 150 Continuous Auditing Part4

    Lecture 151 Continuous Auditing Part5

    Lecture 152 Module 01 Review

    Section 2: Module 02 - Governance and Management of IT

    Lecture 153 Introduction

    Lecture 154 Lesson 1: Corporate Governance

    Lecture 155 Corporate Governance Part1

    Lecture 156 Corporate Governance Part2

    Lecture 157 Corporate Governance Part3

    Lecture 158 Lesson 2: IT Governance

    Lecture 159 IT Governance Part1

    Lecture 160 IT Governance Part2

    Lecture 161 Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management

    Lecture 162 IT Monitoring and Assurance Practices for Board and Senior Management Part1

    Lecture 163 IT Monitoring and Assurance Practices for Board and Senior Management Part2

    Lecture 164 IT Monitoring and Assurance Practices for Board and Senior Management Part3

    Lecture 165 Best Practices for IT Governance Part1

    Lecture 166 Best Practices for IT Governance Part2

    Lecture 167 Best Practices for IT Governance Part3

    Lecture 168 Best Practices for IT Governance Part4

    Lecture 169 IT Governance Frameworks

    Lecture 170 Audit Role in IT Governance Part1

    Lecture 171 Audit Role in IT Governance Part2

    Lecture 172 Audit Role in IT Governance Part3

    Lecture 173 Audit Role in IT Governance Part4

    Lecture 174 IT Strategy Committee

    Lecture 175 IT Balanced Scorecard Part1

    Lecture 176 IT Balanced Scorecard Part2

    Lecture 177 Information Security Governance Part1

    Lecture 178 Information Security Governance Part2

    Lecture 179 Information Security Governance Part3

    Lecture 180 Information Security Governance Part4

    Lecture 181 Importance of Information Security Governance Part1

    Lecture 182 Importance of Information Security Governance Part2

    Lecture 183 Outcomes of Security Governance Part1

    Lecture 184 Outcomes of Security Governance Part2

    Lecture 185 Effective Information Security Governance

    Lecture 186 Roles and Responsibilities of Senior Management and Board of Directors Part1

    Lecture 187 Roles and Responsibilities of Senior Management and Board of Directors Part2

    Lecture 188 Enterprise Architecture

    Lecture 189 Lesson 4: Information Systems Strategy

    Lecture 190 Strategic Planning Part1

    Lecture 191 Strategic Planning Part2

    Lecture 192 Steering Committee

    Lecture 193 Lesson 5: Maturity and Process Improvement Models

    Lecture 194 Maturity and Process Improvement Models

    Lecture 195 Lesson 6: IT Investment and Allocation Practices

    Lecture 196 IT Investment and Allocation Practices Part1

    Lecture 197 IT Investment and Allocation Practices Part2

    Lecture 198 IT Investment and Allocation Practices Part3

    Lecture 199 IT Investment and Allocation Practices Part4

    Lecture 200 Implement IT Portfolio Management

    Lecture 201 IT Portfolio Management Versus Balanced Scorecard

    Lecture 202 Lesson 7: Policies and Procedures

    Lecture 203 Policies Part1

    Lecture 204 Policies Part2

    Lecture 205 Policies Part3

    Lecture 206 Information Security Policy Part1

    Lecture 207 Information Security Policy Part2

    Lecture 208 Information Security Policy Part3

    Lecture 209 Information Security Policy Part4

    Lecture 210 Information Security Policy Part5

    Lecture 211 Information Security Policy Part6

    Lecture 212 Information Security Policy Part7

    Lecture 213 Procedures Part1

    Lecture 214 Procedures Part2

    Lecture 215 Lesson 8: Risk Management

    Lecture 216 Risk Management

    Lecture 217 Developing a Risk Management Program

    Lecture 218 Risk Management Process Part1

    Lecture 219 Risk Management Process Part2

    Lecture 220 Risk Management Process Part3

    Lecture 221 Risk Management Process Part4

    Lecture 222 Risk Management Process Part5

    Lecture 223 Risk Management Process Part6

    Lecture 224 Risk Analysis Methods Part1

    Lecture 225 Risk Analysis Methods Part2

    Lecture 226 Risk Analysis Methods Part3

    Lecture 227 Risk Analysis Methods Part4

    Lecture 228 Risk Analysis Methods Part5

    Lecture 229 Lesson 9: IS Management Practices

    Lecture 230 Human Resource Management Part1

    Lecture 231 Human Resource Management Part2

    Lecture 232 Human Resource Management Part3

    Lecture 233 Human Resource Management Part4

    Lecture 234 Human Resource Management Part5

    Lecture 235 Human Resource Management Part6

    Lecture 236 Human Resource Management Part7

    Lecture 237 Human Resource Management Part8

    Lecture 238 Human Resource Management Part9

    Lecture 239 Human Resource Management Part10

    Lecture 240 Human Resource Management Part11

    Lecture 241 Human Resource Management Part12

    Lecture 242 Human Resource Management Part13

    Lecture 243 Human Resource Management Part14

    Lecture 244 Organizational Change Management

    Lecture 245 Financial Management Practices

    Lecture 246 Quality Management Part1

    Lecture 247 Quality Management Part2

    Lecture 248 Quality Management Part3

    Lecture 249 Information Security Management

    Lecture 250 Performance Optimization Part1

    Lecture 251 Performance Optimization Part2

    Lecture 252 Performance Optimization Part3

    Lecture 253 Lesson 10: IS Organizational Structure and Responsibilities

    Lecture 254 IS Roles and Responsibilities Part1

    Lecture 255 IS Roles and Responsibilities Part2

    Lecture 256 IS Roles and Responsibilities Part3

    Lecture 257 Segregation of Duties

    Lecture 258 Segregation of Duties Controls Part1

    Lecture 259 Segregation of Duties Controls Part2

    Lecture 260 Compensating Controls for Lack of Segregation

    Lecture 261 Lesson 11: Auditing IT Governance Structure and Implementation

    Lecture 262 Reviewing Documentation Part1

    Lecture 263 Reviewing Documentation Part2

    Lecture 264 Reviewing Contractual Commitments

    Lecture 265 Lesson 12: Business Continuity Planning Part1

    Lecture 266 Business Continuity Planning Part2

    Lecture 267 Business Continuity Planning Part3

    Lecture 268 IS Business Continuity Planning

    Lecture 269 Disasters and Other Disruptive Events Part1

    Lecture 270 Disasters and Other Disruptive Events Part2

    Lecture 271 Business Continuity Planning Process

    Lecture 272 Business Continuity Policy

    Lecture 273 Business Impact Analysis Part1

    Lecture 274 Business Impact Analysis Part2

    Lecture 275 Classification of Operations and Criticality Analysis

    Lecture 276 Development of Business Continuity Plans

    Lecture 277 Other Issues and Plan Development

    Lecture 278 Components of a BCP Part1

    Lecture 279 Components of a BCP Part2

    Lecture 280 BCP Testing Part1

    Lecture 281 BCP Testing Part2

    Lecture 282 BCP Testing Part3

    Lecture 283 BCP Maintenance

    Lecture 284 Summary of BCP

    Lecture 285 Module 02 Review

    Section 3: Module 03 - Information Systems Acquisition, Development and Implementation

    Lecture 286 Lesson 1: Business Realization Part1

    Lecture 287 Business Realization Part2

    Lecture 288 Portfolio/Program Management Part1

    Lecture 289 Portfolio/Program Management Part2

    Lecture 290 Portfolio/Program Management Part3

    Lecture 291 Portfolio/Program Management Part4

    Lecture 292 Portfolio/Program Management Part5

    Lecture 293 Business Case Development and Approval Part1

    Lecture 294 Business Case Development and Approval Part2

    Lecture 295 Benefits Realization Techniques

    Lecture 296 Lesson 2: Project Management Structure

    Lecture 297 Project Context and Environment

    Lecture 298 Project Organizational Forms Part1

    Lecture 299 Project Organizational Forms Part2

    Lecture 300 Project Communication and Culture

    Lecture 301 Project Objectives Part1

    Lecture 302 Project Objectives Part2

    Lecture 303 Project Objectives Part3

    Lecture 304 Roles and Responsibilities of Groups and Individuals Part1

    Lecture 305 Roles and Responsibilities of Groups and Individuals Part2

    Lecture 306 Roles and Responsibilities of Groups and Individuals Part3

    Lecture 307 Lesson 3: Project Management Practices

    Lecture 308 Initiation of a Project

    Lecture 309 Project Planning

    Lecture 310 Example of Project Management for New Software

    Lecture 311 Software Size Estimation

    Lecture 312 Lines of Source Code

    Lecture 313 Function Point Analysis (FPA)

    Lecture 314 Function Points

    Lecture 315 Cost Budgets

    Lecture 316 Software Cost Estimation

    Lecture 317 Scheduling and Establishing the Timeframe

    Lecture 318 Critical Path Methodology

    Lecture 319 Gantt Charts

    Lecture 320 Program Evaluation Review Technique (PERT)

    Lecture 321 Time Box Management

    Lecture 322 General Project Management

    Lecture 323 Project Controlling Part1

    Lecture 324 Project Controlling Part2

    Lecture 325 Management of Resource Usage

    Lecture 326 Management of Risk Part1

    Lecture 327 Management of Risk Part2

    Lecture 328 Closing a Project

    Lecture 329 Lesson 4: Business Application Development Part1

    Lecture 330 Business Application Development Part2

    Lecture 331 Business Application Development Part3

    Lecture 332 Business Application Development Part4

    Lecture 333 Business Application Development Part5

    Lecture 334 Traditional SDLC Approach

    Lecture 335 SDLC Phases

    Lecture 336 SDLC

    Lecture 337 Integrated Resource Management Systems Part1

    Lecture 338 Integrated Resource Management Systems Part2

    Lecture 339 Integrated Resource Management Systems Part3

    Lecture 340 Description of SDLC Phases Part1

    Lecture 341 Description of SDLC Phases Part2

    Lecture 342 Description of SDLC Phases Part3

    Lecture 343 Description of SDLC Phases Part4

    Lecture 344 Description of SDLC Phases Part5

    Lecture 345 Description of SDLC Phases Part6

    Lecture 346 Description of SDLC Phases Part7

    Lecture 347 Description of SDLC Phases Part8

    Lecture 348 Description of SDLC Phases Part9

    Lecture 349 Description of SDLC Phases Part10

    Lecture 350 Description of SDLC Phases Part11

    Lecture 351 Description of SDLC Phases Part12

    Lecture 352 Description of SDLC Phases Part13

    Lecture 353 Description of SDLC Phases Part14

    Lecture 354 Description of SDLC Phases Part15

    Lecture 355 Description of SDLC Phases Part16

    Lecture 356 Description of SDLC Phases Part17

    Lecture 357 Description of SDLC Phases Part18

    Lecture 358 Description of SDLC Phases Part19

    Lecture 359 Description of SDLC Phases Part20

    Lecture 360 Description of SDLC Phases Part21

    Lecture 361 Description of SDLC Phases Part22

    Lecture 362 Description of SDLC Phases Part23

    Lecture 363 Risks Associated with Software Development Part1

    Lecture 364 Risks Associated with Software Development Part2

    Lecture 365 Lesson 5: Business Application Systems

    Lecture 366 Electronic Commerce

    Lecture 367 E-Commerce Models

    Lecture 368 E-Commerce Architectures

    Lecture 369 E-Commerce Risks

    Lecture 370 E-Commerce Requirements

    Lecture 371 E-Commerce Audit and Control Issues or Best Practices

    Lecture 372 Components of PKI

    Lecture 373 Electronic Data Interchange

    Lecture 374 General Requirements of EDI

    Lecture 375 Traditional EDI

    Lecture 376 Web Based EDI

    Lecture 377 EDI Risks and Controls

    Lecture 378 Controls in EDI Environment Part1

    Lecture 379 Controls in EDI Environment Part2

    Lecture 380 Controls in EDI Environment Part3

    Lecture 381 Controls in EDI Environment Part4

    Lecture 382 E-Mail

    Lecture 383 E-Mail Security Issues

    Lecture 384 Standards for E-Mail Security Part1

    Lecture 385 Standards for E-Mail Security Part2

    Lecture 386 Standards for E-Mail Security Part3

    Lecture 387 Point-Of-Sale Systems (POS)

    Lecture 388 Electronic Banking Part1

    Lecture 389 Electronic Banking Part2

    Lecture 390 Risk Management Challenges in E-Banking

    Lecture 391 Risk Management Controls for E-Banking Part1

    Lecture 392 Risk Management Controls for E-Banking Part2

    Lecture 393 Electronic Finance

    Lecture 394 Payment Systems

    Lecture 395 Electronic Money Model

    Lecture 396 Electronic Checks Model

    Lecture 397 Electronic Transfer Model

    Lecture 398 Electronic Funds Transfer

    Lecture 399 Controls in an EFT Environment Part1

    Lecture 400 Controls in an EFT Environment Part2

    Lecture 401 Automated Teller Machines Part1

    Lecture 402 Automated Teller Machines Part2

    Lecture 403 Image Processing Part1

    Lecture 404 Image Processing Part2

    Lecture 405 Business Intelligence

    Lecture 406 Decision Support System (DSS)

    Lecture 407 DSS Frameworks

    Lecture 408 Customer Relation Management (CRM)

    Lecture 409 Supply Chain Management (SCM)

    Lecture 410 Lesson 6: Alternative Forms of Software Project Organization Part1

    Lecture 411 Alternative Forms of Software Project Organization Part2

    Lecture 412 Alternative Forms of Software Project Organization Part3

    Lecture 413 Agile Development

    Lecture 414 Prototyping

    Lecture 415 Rapid Application Development (RAD)

    Lecture 416 Lesson 7: Alternative Development Methods

    Lecture 417 Data Oriented System Development

    Lecture 418 Object Oriented System Development Part1

    Lecture 419 Object Oriented System Development Part2

    Lecture 420 Component-Based Development

    Lecture 421 Web-Based Application Development

    Lecture 422 Software Reengineering

    Lecture 423 Reverse Engineering

    Lecture 424 Lesson 8: Infrastructure Development/Acquisition Practices Part1

    Lecture 425 Infrastructure Development/Acquisition Practices Part2

    Lecture 426 Infrastructure Development/Acquisition Practices Part3

    Lecture 427 Project Phases of Physical Architecture Analysis Part1

    Lecture 428 Project Phases of Physical Architecture Analysis Part2

    Lecture 429 Planning Implementation of Infrastructure Part1

    Lecture 430 Planning Implementation of Infrastructure Part2

    Lecture 431 Critical Success Factors

    Lecture 432 Hardware Acquisition

    Lecture 433 Acquisition Steps Part1

    Lecture 434 Acquisition Steps Part2

    Lecture 435 System Software Acquisition

    Lecture 436 System Software Implementation

    Lecture 437 System Software Change Control Procedures

    Lecture 438 Lesson 9: Information Systems Maintenance Practices

    Lecture 439 Change Management Process Overview

    Lecture 440 Deploying Changes

    Lecture 441 Documentation

    Lecture 442 Testing Changed Programs

    Lecture 443 Auditing Program Changes

    Lecture 444 Emergency Changes

    Lecture 445 Change Exposures (Unauthorized Changes)

    Lecture 446 Configuration Management Part1

    Lecture 447 Configuration Management Part2

    Lecture 448 Lesson 10: System Development Tools And Productivity Aids

    Lecture 449 Code Generators

    Lecture 450 Computer Aided Software Engineering Part1

    Lecture 451 Computer Aided Software Engineering Part2

    Lecture 452 Computer Aided Software Engineering Part3

    Lecture 453 Fourth-Generation Languages (4GL) Part1

    Lecture 454 Fourth-Generation Languages (4GL) Part2

    Lecture 455 Lesson 11: Business Process Reengineering And Process Change Projects

    Lecture 456 Business Process Reengineering And Process Change Projects Continued

    Lecture 457 Benchmarking Process Part1

    Lecture 458 Benchmarking Process Part2

    Lecture 459 The Benchmarking Process

    Lecture 460 ISO 9126

    Lecture 461 Software Capability Maturity Model

    Lecture 462 ISO 15504

    Lecture 463 Lesson 12: Application Controls

    Lecture 464 Inputs Controls Part1

    Lecture 465 Inputs Controls Part2

    Lecture 466 Inputs Controls Part3

    Lecture 467 Inputs Controls Part4

    Lecture 468 Processing Procedures And Controls

    Lecture 469 Processing Controls

    Lecture 470 Data File Control Procedures

    Lecture 471 Output Controls Part1

    Lecture 472 Output Controls Part2

    Lecture 473 Business Process Control Assurance

    Lecture 474 Lesson 13: Auditing Application Controls Part1

    Lecture 475 Auditing Application Controls Part2

    Lecture 476 Risk Assessment Model To Analyze Application Controls

    Lecture 477 Observing And Testing User Performing Procedures

    Lecture 478 Data Integrity Testing

    Lecture 479 Example Of Referential And Relational Integrity

    Lecture 480 Data Integrity In Online Transaction Processing Systems

    Lecture 481 Test Application Systems

    Lecture 482 Continuous Online Auditing

    Lecture 483 Online Auditing Techniques

    Lecture 484 Lesson 14: Auditing Systems Development, Acquisition And Maintenance

    Lecture 485 Project Management

    Lecture 486 Feasibility Study

    Lecture 487 Requirements Definition

    Lecture 488 Software Acquisition Process

    Lecture 489 Detailed Design And Development

    Lecture 490 Testing

    Lecture 491 Implementation Phase

    Lecture 492 Post Implementation Review

    Lecture 493 System Change Procedures And The Program Migration Process

    Lecture 494 Module 03 Review

    Section 4: Module 04 - Information Systems Operations, Maintenance and Support

    Lecture 495 Introduction

    Lecture 496 Lesson 1: Information Systems Operations

    Lecture 497 Management of IS Operations

    Lecture 498 Service Management Part1

    Lecture 499 Service Management Part2

    Lecture 500 Service Management Part3

    Lecture 501 Service Management Part4

    Lecture 502 Service Management Part5

    Lecture 503 Service Level Part1

    Lecture 504 Service Level Part2

    Lecture 505 Infrastructure Operations

    Lecture 506 Scheduling Part1

    Lecture 507 Scheduling Part2

    Lecture 508 Monitoring Use of Resources

    Lecture 509 Process of Incident Handling

    Lecture 510 Problem Management

    Lecture 511 Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions

    Lecture 512 Support/Helpdesk Part1

    Lecture 513 Support/Helpdesk Part2

    Lecture 514 Change Management Process Part1

    Lecture 515 Change Management Process Part2

    Lecture 516 Release Management Part1

    Lecture 517 Release Management Part2

    Lecture 518 Information Security Management

    Lecture 519 Media Sanitization

    Lecture 520 Lesson 2: Information Systems Hardware

    Lecture 521 Computer Hardware Components and Architecture

    Lecture 522 Common Enterprise Backend Devices

    Lecture 523 Specialized Devices

    Lecture 524 Risks

    Lecture 525 Security Control

    Lecture 526 Radiofrequency Identification

    Lecture 527 RFID Applications

    Lecture 528 RFID Risks

    Lecture 529 RFID Security Control

    Lecture 530 Hardware Maintenance Program

    Lecture 531 Hardware Monitoring Procedures

    Lecture 532 Capacity Management Part1

    Lecture 533 Capacity Management Part2

    IT audit, control, assurance, and security professionals,IT consultants, auditors, and managers,Security policy writers,Privacy officers,Information security officers,Network and system administrators,Network security engineers