iCollege – CISA Certified Information Systems Auditor

iCollege – CISA Certified Information Systems Auditor
English | Size: 2.21 GB
Category: Security

CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms "enterprise" and "organization" or "organizational" are considered synonymous. [Read more…]

SANS SEC573 Automating Information Security with Python usb

SANS SEC573 : Automating Information Security with Python usb
English | Size: 3.88 GB
Category: e-Books

SEC573.1: Essentials Workshop with pyWars
SEC573.2: Essentials Workshop with MORE pyWars
SEC573.3: Defensive Python
SEC573.4: Forensics Python
SEC573.5: Offensive Python
SEC573.6: Capture the Flag [Read more…]

Pluralsight – Achieving Basic Awareness of Information Security Measures (ISO-IEC 27002)

Pluralsight – Achieving Basic Awareness of Information Security Measures (ISO-IEC 27002)
English | Size: 544.38 MB
Category: CBTs

The perfect starting point for Information Security awareness training, this course presents high-level security concepts that apply to everyone who uses technology to manage information.

In business, Information Security is everyone’s responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you. Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of Information Security Measures is an essential place to start. [Read more…]

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition
English | Size: 409.64 MB
Category: CBTs

Note 1: This is a scanned PDF version of book’s hardcopy.
Note 2: ISC2 is planning to revise the CISSP Domains in April 2018. Now is the time to study and challenge this Certification exam before its revised.

The CISSP Study Guide, 7th Edition is your one-stop resource for complete coverage of the 2015 CISSP Body of Knowledge. This Sybex Study Guide covers 100% of the 2015 CISSP exam candidate information bulletin objectives. You’ll prepare for the exam smarter and faster with Sybex thanks to superior content including, assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions. Reinforce what you have learned with the exclusive Sybex online learning environment and test bank, assessable across multiple devices. Get prepared for the CISSP exam with Sybex. [Read more…]

Packt Publishing – Information Gathering with Kali Linux

Packt Publishing – Information Gathering with Kali Linux
English | Size: 334.09 MB
Category: Tutorial

Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world’s most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage.
[Read more…]

Packt-Information Gathering with Kali Linux

Packt-Information Gathering with Kali Linux
English | Size: 334.1 MB
Category: Tutorial

Kali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world’s most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage.
[Read more…]

Lynda – CISA Cert Prep – 1 Auditing Information Systems for IS Auditors

Lynda – CISA Cert Prep – 1 Auditing Information Systems for IS Auditors
English | Size: 148.45 MB
Category: Tutorial

Earning a CISA certification validates your ability to audit, control, and monitor information systems. The CISA Cert Prep series prepares you to tackle this exam by going into each of the topics it covers, helping you acquire the skills you need to confidently manage IT security audits. In this course-the first in the series-take a deep dive into the concepts covered in the Process of Auditing Information Systems domain. Learn how to organize and plan an audit, put controls in place, and use a repeatable audit process to ensure that your results are meaningful and your audit is complete. Plus, learn about communicating results with an audit outbrief, embedding the audit function into operations, and how continuous auditing can help you identify and fix problems more effectively. [Read more…]

Pluralsight – Information Security Manager Information Security Governance

Pluralsight – Information Security Manager: Information Security Governance
English | Size: 457.34 MB
Category: CBTS

While protecting information assets is the primary goal of an information security program, governance sets the requirements for how the program must function within the compliance context. Organizations must operate their security programs in compliance with laws, regulations, policies, and standards. In this course, Information Security Manager: Information Security Governance, you’ll gain solid foundational knowledge on the governance aspect of security, as well as skills you can use to effectively manage security compliance in your organization. First, you’ll explore how both internal and external governance affect the organization, how information security strategy supports the mission and overall organizational strategy, and the different roles and responsibilities involved in the security program. Next, you’ll learn how to write business cases to support security budgets and investments. Finally, you’ll cover stakeholders and how to communicate the security strategy to them and gain their commitment to it. By the end of this course, you’ll be well-versed in information security governance and how it affects an information security program. [Read more…]

[Udemy] Certified Information Systems Security Professional – CISSP

[Udemy] Certified Information Systems Security Professional – CISSP
English | Size: 1.70 GB
Category: CBTs

In today fast evolving times technological solutions by itself cannot protect an organizations important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers, employees, stakeholders and organizational information assets.
The CISSP is an internationally recognized certification for information security professionals. Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.
Benefits of the CISSP Certification for Professionals [Read more…]

CBT Nuggets Course (Videos) – EMC Information Storage and Management (EMCISA)

CBT Nuggets Course (Videos) – EMC Information Storage and Management (EMCISA)
English | Size: 2.41 GB
Category: CBTs

1. EMCISA Introduction (5 min)
2. Intro to Storage Management (15 min)
3. Hosts and Applications (10 min)
4. Introduction to Connectivity (7 min)
5. Introduction to Storage Devices (9 min)
6. Disk Drive Components (14 min)
7. Disk Drive Performance (12 min)
8. Block vs. File vs. Object Level Data Access (10 min)
9. Direct-Attached Storage (6 min) [Read more…]