Search This Blog

Showing posts with label CISA. Show all posts
Showing posts with label CISA. Show all posts

Wednesday, February 13, 2019

CISA 2018 (Certified Information Systems Auditor) Complete 5 Domains Video Course on 2 DVDs



Table of Contents

Domain 1: The Process of Auditing Information Systems
Lesson 1: Audit Fundamentals
1.1: Understanding the Audit Function
1.2: Adhering to ISACA IS Audit and Assurance Standards and Guidelines
1.3: Identifying the Risk/Audit Relationship
1.4: Surveying IS Controls
Lesson 1 Review
Lesson 2: Auditing
2.1: Performing an IS Audit
2.2: Gathering Audit Evidence
2.3: Understanding Sampling Techniques
2.4: Reporting and Communicating Audit Results
2.5: Audit Evolutions
Lesson 2 Review
Module 1 Summary

Domain 2: Governance and Management of IT
Lesson 3: Governance Structure, Processes, and Models
3.1: Understanding Corporate and Information Security Governance (Defining Governance)
3.2: Designing Strategic Plans, Policies, and Procedures
3.3: Surveying IT Organizational Structures and SOD
3.4: Surveying Maturity and Process Implementation Models
3.5: Understanding Performance Optimization
3.6: Auditing IT Governance
Lesson 3 Review

Lesson 4: Risk Management
4.1: Evaluating a Risk Management Program
4.2: Conducting a Risk Assessment
4.3: Auditing Risk Management
Lesson 4 Review

Lesson 5: Third-Party Relationships
5.1: Examining Outsourcing and Third-Party Management
5.2: Deconstructing Cloud Computing
5.3: Auditing Third-Party Relationships
Lesson 5 Review

Lesson 6: Business Continuity
6.1: Defining Business Continuity Planning
6.2: Examining a Business Impact Analysis (BIA)
6.3: Designing Business Continuity Plans
6.4: Evaluating Business Continuity Testing and Readiness
6.5: Auditing Business Continuity
Lesson 6 Review
Module 2 Summary

Domain 3: Information Systems Acquisition, Development, and Implementation 
Lesson 7: Project Management
7.1: Developing a Business Case
7.2: Understanding Portfolio Management
7.3: Defining Project Management
7.4: Auditing Project Management
Lesson 7 Review

Lesson 8: Application Development
8.1: Exploring Business Application Development
8.2: Identifying Software Development Testing Techniques
8.3: Recognizing Source Code Vulnerabilities
8.4: Auditing the Development Process
Lesson 8 Review

Lesson 9: System Acquisition and Implementation
9.1: Exploring Acquisition Processes
9.2: Deconstructing System Implementation
9.3: Recognizing Application Controls
9.4: Understanding Configuration and Change Management
9.5: Auditing Acquisition and Implementation
Lesson 9 Review
Module 3 Summary

Domain 4: Information Systems Operations, Maintenance, and Service Management 
Lesson 10: IS Operational Management
10.1: Surveying Information Systems Management and Frameworks
10.2: Managing Operational Processes
10.3: Understanding Asset Management
10.4: Auditing IS Operational Management
Lesson 10 Review

Lesson 11: Data Management
11.1: Defining Data Management
11.2: Exploring Database Management Systems (DBMS)
11.3: Auditing Data Management
Lesson 11 Review

Lesson 12: Network Architecture
12.1: Examining OSI Model and TCP/IP Models
12.2: Exploring Transmission Media and Telecommunications
12.3: Understanding Wireless Networks
12.4: Exploring VoIP
12.5: Auditing Network Architecture
Lesson 12 Review

Lesson 13: Disaster Response and Recovery
13.1: Understanding Disaster Response and Recovery Objectives
13.2: Identifying Recovery Strategies
13.3: Assessing Backup and Replication Strategies
13.4: Evaluating Disaster Recovery Plan Maintenance
13.5: Auditing Disaster Response and Recovery
Lesson 13 Review
Module 4 Summary

Domain 5: Protection of Information Assets 
Lesson 14: Information Security Program Management
14.1: Surveying Information Security Management Systems (ISMS)
14.2: Identifying Information Security Classifications and Controls
14.3: Exploring Cyberthreats and Adversaries
14.4: Understanding Incident Management
14.5: Evaluating Investigative and Evidence Handling Capabilities
14.6: Auditing Information Security Program Management
Lesson 14 Review

Lesson 15: Authentication and Authorization
15.1: Examining Identification and Authentication
15.2: Exploring Access Control
15.3: Monitoring Access
15.4: Auditing User Access Controls
Lesson 15 Review

Lesson 16: Infrastructure Security
16.1: Surveying Perimeter Security
16.2: Managing Malware
16.3: Security Endpoint
16.4: Mobile Device Challenges
16.5: Testing Network Infrastructure Security
16.6: Auditing Infrastructure Security Controls
Lesson 16 Review

Lesson 17: Cryptography
17.1: Demystifying Encryption
17.2: Applying Asymmetric Encryption
17.3: Examining Hashing and Digital Signatures
17.4: Understanding Digital Certificates
17.5: Identifying Cryptographic Protocols and Attacks
17.6: Auditing Cryptographic Protocols 
Lesson 17 Review

Lesson 18: Physical and Environmental Security
18.1: Examining Environmental Threats
18.2: Securing People and Places
18.3: Auditing Environmental and Physical Access
Lesson 18 Review
Module 5 Summary

Module 6: Acing Your Exam 
Lesson 19: Understanding the Exam Structure
Lesson 20: Test Taking Strategies
Lesson 21: What to Expect at the Testing Center
Lesson 22: Attaining and Maintaining Your CISA Certification


Buy This Course DVD Now @







                                    






Saturday, March 4, 2017

(ISC)2 CISSP Certified Information Systems Security Professional Exam Video Training Course DVD Rs 399/-



Duration : 10 Hours - 39 Video Lessons 

1. Welcome to CISSP (16 min)
2. CIA Concepts (4 min)
3. Policies (13 min)
4. Risk (13 min)
5. Control Types (17 min)
6. Security Awareness Training (6 min)
7. Ethical Hacking (13 min)
8. Symmetric Cryptography (19 min)
9. Asymmetric Cryptography (24 min)
10. Fire (16 min)
11. Physical Security (13 min)
12. Electric Power (12 min)
13. OSI Lower Layers (29 min)
14. OSI Upper Layers (24 min)
15. Firewalls (21 min)
16. VPNs (27 min)
17. Attacks (21 min)
18. Authentication Concepts (9 min)
19. Multifactor Authentication (15 min)
20. Centralized Management (17 min)
21. SSO and Security Threats (25 min)
22. Computing System Evaluations (15 min)
23. Security Model Details (11 min)
24. Availability and Integrity Design (14 min)
25. IDS and IPS (17 min)
26. Controls for Operational Security (19 min)
27. Separation of Duties (18 min)
28. Backups and Media (16 min)
29. DR and BC (20 min)
30. Malware (14 min)
31. Evidence (12 min)
32. Laws and Liability (10 min)
33. Incident Response (15 min)
34. System and Software Security (16 min)
35. Virtualization and Cloud (13 min)
36. 2700x (6 min)
37. Federated Identities (11 min)
38. EPA (16 min)
39. Monitoring and More (12 min)


======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner

Thursday, February 23, 2017

ISACA CISA 2016 - Certified Information Systems Auditor Video Training Course DVD Rs 450/-




Duration : 11 HOURS

98 Video Lessons

1. CISA Overview (7 min)
2. The Process of Auditing Information Systems (11 min)
3. IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (9 min)
4. Audit Risk Assessment (15 min)
5. Business Processes (5 min)
6. Control Objectives (8 min)
7. Audit Planning and Management (9 min)
8. Laws and Regulations (3 min)
9. Evidence (11 min)
10. Sampling Methodologies (9 min)
11. Reporting and Communications (5 min)
12. Audit Quality Assurance (3 min)
13. Types of Audits (5 min)
14. Governance and Management of IT (8 min)
15. Information Systems Strategy (10 min)
16. Standards, Governance and Frameworks (9 min)
17. IT Organization (6 min)
18. Legal Compliance (8 min)
19. Enterprise Architecture (4 min)
20. Maintenance of Policies and Procedures (2 min)
21. Maturity Models (5 min)
22. Process Optimization (3 min)
23. IT Investment Strategies (5 min)
24. IT Vendor Selection and Management (8 min)
25. IT Risk Management (8 min)
26. Control Processes (4 min)
27. Quality Management Systems (4 min)
28. IT Performance Monitoring and Reporting (6 min)
29. BCP - Business Impact Analysis (8 min)
30. BCP – Maintenance and Testing (3 min)
31. BCP - Invoke and Return to Normal (7 min)
32. Information Systems Acquisition, Development and Implementation (9 min)
33. Benefits Realization (5 min)
34. Vendor Management (7 min)
35. Project Governance (9 min)
36. Project Management (17 min)
37. Risk Management (5 min)
38. Requirements Management (7 min)
39. Application Architecture (5 min)
40. Methodologies (12 min)
41. Control Objectives and Techniques (11 min)
42. Testing (10 min)
43. Configuration and Change Management (6 min)
44. System Migration and Deployment (10 min)
45. Project Success Criteria (5 min)
46. Post-Implementation Reviews (4 min)
47. Information Systems Operations, Maintenance & Support (8 min)
48. Service Level Frameworks (6 min)
49. Service Level Management (7 min)
50. Monitor 3rd Party Compliance (4 min)
51. Architecture (11 min)
52. Computer Hardware, Software and Networks (22 min)
53. Software Resiliency Tools and Techniques (4 min)
54. Software Licensing and Inventory Interfaces (3 min)
55. Managing Schedules (6 min)
56. System Interface Integrity (10 min)
57. Capacity Planning (4 min)
58. Performance Monitoring (3 min)
59. Data Backup (5 min)
60. Database Administration Practices (9 min)
61. Data Quality and Retention (6 min)
62. Problem and Incident Management (5 min)
63. Managing Change to Production Environments (3 min)
64. Risks and Controls for End User Computing (6 min)
65. Disaster Recovery – Legal and Contractual Issues (7 min)
66. Business Impact of Disaster Recovery (2 min)
67. Disaster Recovery Plan Maintenance (5 min)
68. Alternate Processing Sites (9 min)
69. Disaster Recovery Testing (4 min)
70. Invoking Disaster Recovery (6 min)
71. Protection of Information Assets (8 min)
72. Information Asset Protection (4 min)
73. Privacy Principles (6 min)
74. Security Controls (5 min)
75. Environmental Protection (6 min)
76. Physical Access Controls (5 min)
77. Logical Access Controls (3 min)
78. Identification and Authentication (3 min)
79. Virtual Systems (5 min)
80. Mobile Devices (3 min)
81. Voice Communication (4 min)
82. Internet Security, Protocols and Techniques (9 min)
83. Network Security Concerns (4 min)
84. Data Encryption (3 min)
85. Public Key Infrastructure (5 min)
86. Peer to Peer Computing (5 min)
87. Data Classification Standards (4 min)
88. Handling Confidential Data (4 min)
89. Data Leakage (4 min)
90. End-User Computing Security (5 min)
91. Security Awareness Program (4 min)
92. Cyber Attacks (7 min)
93. Detection Tools (4 min)
94. Security Testing Techniques (6 min)
95. Security Incidents (3 min)
96. Handling of Evidence (4 min)
97. Fraud Risk Factors (6 min)
98. Passing the Exam (7 min)

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner

Thursday, June 16, 2016

CISSP Certification 2016 Complete 8 Domains Video Training Course On 3 DVDs Rs799/-



===================================



Total Video training Duration 54 Hours

Total video Lessons : 440

DVDs : 3

=================================


CISSP Certification Training: Domain 1

Duration: 7 hours  

63 tutorial video Lessons

01. CISSP Course Introduction
02. Security Concepts
03. Security Governance
04. Risk Management
05 Personnel Security
06. Security Awareness Training
07. Wrap Up


CISSP Certification Training: Domain 2

Duration: 4.5 hours 

35 tutorial video Lessons


01. Asset Security - Introduction
02. The Information Lifecycle
03. Roles And Responsibilities
04. Data Classification
05. Data Retention
06. Security Controls
07. Wrap Up



CISSP Certification Training: Domain 3

Duration: 11 hours  

107 tutorial video Lessons

01. Security Engineering - Introduction
02. Security Models
03. Computer Hardware Architecture
04. Operating System Architecture
05. Virtualization
06. Information Systems And Application Architecture
07. Introduction To Cryptography
08. Hashing Algorithms
09. Symmetric Key Algorithms
10. Asymmetric Key Algorithms
11. Cryptography In Use
12. Attacks On Cryptography
13. Physical Security
14. Conclusion

CISSP Certification Training: Domain 4 

Duration: 11 hours 

88 tutorial video Lessons

01. Introduction
02. The Open Systems Interconnection Model
03. Transmission Media And Technologies
04. Network Infrastructures And Application Architecture
05. Wireless Networking
06. Protocols
07. Network Technologies
08. Attacks On Networks
09. Wrap Up


CISSP Certification Training: Domain 5


Duration: 7 hours  

55 tutorial video Lessons


01. Identity And Access Management
02. Introduction And Key Terms
03. Identification And Authentication
04. Single Sign-On And Federated Identity Management
05. Authorization
06. Conclusion

CISSP Certification Training: Domain 6


Duration: 3 hours 

19 Video Lessons

01. Security Assessment And Testing
02. Security Control Testing Strategies
03. Collecting Security Process Data
04. Auditing

05. Wrap Up

CISSP Certification Training: Domain 7

Security Operations

Run time: 8 hours 10 minutes

Introduction 05m  38s

Provisioning

Change Management 09m  16s

Physical, Virtual, And Cloud 09m  58s

Infrastructure And Firewalls 08m  13s

Security Components 10m  23s

Services, Servers, WS, And VOIP 08m  35s

Apps, Protocols, And Users 09m  24s

Asset Inventory 07m  15s

Planning 08m  27s

Acquisition 10m  15s

Deployment 08m  50s

Maintaining Systems And Services

Maintenance 07m  27s

Repairs And AV 09m  17s

Logging 09m  29s

Remote Log Repository 08m  50s

Auditing 03m  26s

IDS And IPS 07m  21s

NIDS 09m  30s

NIDS, NIPS, And HIPS 08m  47s

DLP 07m  43s

Honeypot, Honeynet, And Honeytoken 09m  08s

SIEM And Inspections 06m  25s

Monitoring Users 09m  40s

Configuration And Performance Testing 09m  54s

Vulnerability And Penetration Testing 10m  27s

Reports And Decommissioning 08m  28s

Incident Response

Incident Response Introduction 06m  40s

Escalation Process 08m  15s

Litigation And Criminal Act 09m  22s

Preparation 10m  43s

Detection And Containment 10m  12s

Eradication 05m  33s

Recovery And Incident Review 04m  59s

Investigations

Investigations 08m  05s

Evidence - Part 1 06m  41s

Evidence - Part 2 06m  07s

Digital Forensics 11m  04s

Legal Proceedings And EDiscovery 09m  54s

BCP And DRP

BCP And DRP Introduction 06m  54s

BCP And DRP Timelines 12m  15s

BCP And DRP Details 08m  57s

DRP Planning And BIA 07m  43s

DRP Plan Development 06m  43s

DR Teams And Plan Testing 09m  02s

DRP Approval Initiation And Termination 07m  59s

Maintaining The Plans 05m  05s

Recovery Strategies

Recovery Strategies 07m  57s

Alternate Facilities - Part 1 08m  04s

Alternate Facilities - Part 2 07m  22s

Network Recovery 08m  02s

Raid 0 1 08m  18s

Raid 2 3 4 5 And Parity 08m  48s

Full Backup 06m  35s

INC Diff Backups 07m  58s

Backups Electronic Vaulting And Shadow Copies 09m  57s

Journaling, RPO, And RTO 09m  33s

Recovery Of Services And Personnel 10m  41s

Physical Security And Safety

Wrap Up


CISSP Certification Training: Domain 8

Software Development Security

Run time: 2 hours 20 minutes

Application Architecture


Application Architecture Review 10m  56s

The Software Development Lifecycle And Related Development Models

CMM, SDL, And OWASP 09m  54s

Waterfall, Spiral, And Prototyping 07m  38s

Agile Development Platforms And DevOps 07m  44s

Risks Within Software

Buffer Overflow And Injection 10m  18s

Controls To Secure Software Development

Stack Canary, NX Memory, And Garbage Collection 08m  25s

Sandboxing 07m  24s

Input, Process, And Output Controls 09m  14s

Software Development Controls Summary 08m  16s

Testing Software

Web Application Testing 09m  18s

Wrap Up




======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner

Saturday, September 5, 2015

Certified Information Systems Auditor (CISA) 2015 Video Training DVD Rs 399/-



Level :INTERMEDIATE

Duration :12 HOURS /98 VIDEOS LESSONS

1. CISA Overview (11 min)
2. Exam Format (9 min)
3. The CISA Review Manual (7 min)
4. Passing the Exam (8 min)
5. What does a CISA Auditor do? (5 min)
6. Audit Standards (8 min)
7. Types of Audits (7 min)
8. Control Self-Assessment (6 min)
9. Continuous Auditing (7 min)
10. Compensating Controls (7 min)

11. Legacy Auditing (7 min)
12. Third Party Auditors (6 min)
13. Audit Report (7 min)
14. The Process of Auditing Information Systems (16 min)
15. IT Audit Standards, Guidelines, Tools and Techniques and Code of Ethics (12 min)
16. Audit Risk Assessment (20 min)
17. Control Objectives (9 min)
18. Audit Planning and Management (10 min)
19. Business Processes (6 min)
20. Laws and Regulations (3 min)

21. Evidence (11 min)
22. Sampling Methodologies (9 min)
23. Reporting and Communications (5 min)
24. Audit Quality Assurance (3 min)
25. Governance and Management of IT (14 min)
26. Standards, Governance, and Frameworks (10 min)
27. Information Systems Strategy (11 min)
28. IT Organization (6 min)
29. Maintenance of Policies and Procedures (3 min)
30. Enterprise Architecture (5 min)
31. Legal Compliance (9 min)
32. Quality Management Systems (4 min)
33. Maturity Models (5 min)
34. Process Optimization (3 min)
35. IT Investment Practices (5 min)
36. IT Vendor Selection and Management (9 min)
37. IT Risk Management (9 min)
38. IT Performance Monitoring and Reporting (6 min)
39. BCP: HR Policies (5 min)
40. BCP: Business Impact Analysis (8 min)

41. BCP: Maintenance and Testing (4 min)
42. Information Systems Acquisition, Development and Implementation (16 min)
43. Benefits Realization (6 min)
44. Project Governance (9 min)
45. Project Management (19 min)
46. Risk Management (7 min)
47. Architecture (12 min)
48. Vendor Management (6 min)
49. Requirements Management (8 min)
50. Systems Development Life Cycle (SDLC) (12 min)

51. Control Objectives and Techniques (11 min)
52. Methodologies (13 min)
53. Testing (10 min)
54. Configuration and Change Management (7 min)
55. System Migration and Deployment (11 min)
56. Post Implementation Reviews (4 min)
57. Information Systems Operations, Maintenance & Support (6 min)
58. Service Level Management (8 min)
59. Monitor 3rd Party Compliance (4 min)
60. Managing Schedules (6 min)

61. Computer Hardware, Software, and Networks (23 min)
62. Computer Hardware, Software, and Networks (10 min)
63. Software Licensing and Inventory Interfaces (3 min)
64. Database Administration Practices (9 min)
65. Software Resiliency Tools and Techniques (4 min)
66. Capacity Planning (4 min)
67. Performance Monitoring (3 min)
68. Problem and Incident Management (5 min)
69. Managing Change to Production Environments (4 min)
70. Data Backup (5 min)

71. Disaster Recovery: Legal and Contractual Issues (7 min)
72. Business Impact of Disaster Recovery (2 min)
73. Disaster Recovery Plan Maintenance (5 min)
74. Alternate Processing Sites (9 min)
75. Invoking Disaster Recovery (6 min)
76. Disaster Recovery Testing (4 min)
77. Protection of Information Assets (8 min)
78. Security Controls (5 min)
79. Security Incidents (3 min)
80. Logical Access Controls (4 min)

81. Identification and Authentication (3 min)
82. Virtual Systems (5 min)
83. Network Security Concerns (4 min)
84. Internet Security, Protocols, and Techniques (9 min)
85. Cyber Attacks (7 min)
86. Detection Tools (4 min)
87. Security Testing Techniques (6 min)
88. Data Leakage (4 min)
89. Data Encryption (3 min)
90. Public Key Infrastructure (5 min)

91. Peer-to-Peer Computing (5 min)
92. Mobile Devices (3 min)
93. Voice Communication (5 min)
94. Handling of Evidence (5 min)
95. Data Classification Standards (4 min)
96. Physical Access Controls (5 min)
97. Environmental Protection (6 min)
98. Handling Confidential Data (6 min)


======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner