THIS IS A GREAT ONE TIME OFFER, IT MAY NOT BE HERE TOMORROW!
TUTORIAL VIDEOS ON CISA [CERTIFIED INFORMATION SYSTEMS AUDITOR]
topics covered
- Introduction to CISA
- The Information System Audit Process [ parts 1 and 2]
- The information Technology Governance [ parts 1,2 and 3]
- Systems and Infrastructure Life Cycle Management [parts 1,2 and 3]
- IT Service Delivery and Support [parts 1,2 and 3]
- Protection of Information Assets [parts 1, 2 , 3,4 and 5]
- Disaster Recovery and Business Continuity [parts 1 and 2]
Total running time of over 9HRS
TUTORIAL VIDEOS ON CISM [CERTIFIED INFORMATION SYSTEMS MANAGEMENT ]
topics covered
- Introduction to CISM
- Information Security Governance [ parts 1,2 and 3]
- Risk Management [parts 1,2 and 3]
- Information Security Program Development [parts 1,2 and 3]
- Security Programme Management [parts 1,2 and 3]
- Incident Management and Response [parts 1 and 2]
TOTAL RUNNING TIME OF OVER 7HRS
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL { CISSP}
topics covered;
- Introduction to CISSP
- Basics of Access Control
- Advanced Access Control
- Access Control Administration
- Security Models
- Authentication
- Access Control Methods
- Access Attacks
- Penetration Testing
- OSI Model
- Secure Topology
- IP Security
- Remote Access
- Network Security Devices
- Network Security Protocols
- Wide Area Network Technologies
- Security Techniques
- Email Security
- Phone Security
- Security Controls
- Web Vulnerabilities
- Physical Media
- Security Management Concepts
- Security Policy
- Protection mechanisms
- Change Control
- Data Classification
- Risk Management
- Wireless Security
- Roles and Responsibilities
- Security Awareness
- Database Basics
- Database Concepts
- Data Storage
- Artificial Intelligence
- System Development Life cycle
- Security Control Architecture
- Computer Design
- Malicious Code Basics
- Malicious Code Advanced
- Web Enhancements
- Application and System Attacks
- Cryptography Basics
- Cryptography Algorithm
- Cryptography Strength
- Key Management
- Message Authentication
- Secret Key
- Public Key
- PKI
- Cryptography Attacks
- Computer Processing
- Security Architecture Concepts
- Evaluation Criteria
- Security Model Principles
- Trusted Computing Base
- Security Model Threats
- Administrative Management
- Anti-Virus Management
- Sensitive Information Handling
- Control Types
- Machine Types
- Resource Protection
- Auditing
- Audit Trails
- Monitoring
- Intrusion Detection
- Negative Actions
- Business Continuity
- Information System Back-up
- Availability
- Recovery Techniques
- RAID
- Emergency Response
- Types of Laws
- Information Security Laws
- Investigations
- Evidence
- Computer Crime
- Incident Handling
- Ethics
- Facility Requirements
- Environmental Safety
- Physical Threats
TOTAL RUNNING TIME IS OVER 40 HRS
BONUS PACKAGE
CERTIFIED ETHICAL HACKING { CEH }
topics covered
- Introduction
- Hacker Terms
- Hacker Procedures
- Using VMware
- Using Linux
- Passive Intelligence Gathering {parts 1 and 2}
- Social Engineering
- Network Reconnaissance [parts 1 and 2]
- Service Identification and Enumeration
- Vulnerability Assessment [parts 1and 2]
- SNMP
- DNS
- Password Cracking
- Exploits [ parts 1 and 2]
- Web and File Exploits
- Wireless Security
- Erasing Tracks
TO GET THE ENTIRE TUTORIAL VIDEOS LISTED ABOVE, ALL YOU NEED TO DO IS PAY
THE CASH SUM OF #20,000 INTO THE BANK ACCOUNT LISTED BELOW
NAME : UDO-OBIA CRYSTAL .A
BANK ; OCEANIC BANK
ACC NUM : 1890001013636
AFTER PAYMENT, SEND AN SMS CONTAINING YOUR NAME, AMOUNT PAID, E-MAIL ADDRESS, TELLER NUMBER, AND POSTAL ADDRESS, TO THE NUMBER 08068590823.
PLS EXPECT YOUR PACKAGE WITHIN A MAXIMUM OF 48HRS AFTER CONFIRMATION
OF PAYMENT.
LIKE I SAID EARLIER, THIS IS A ONE TIME OFFER, AND MAY BE GONE A LOT SOONER THAN YOU THINK, SO IF YOU REALLY WANT IT, YOU SHOULD QUIT WHATEVER YOU'RE DOING NOW, AND SECURE THIS ADVANTAGE IMMEDIATELY
WITH WARM REGARDS
UDO-OBIA CRYSTAL .A
No comments:
Post a Comment