Imate žicu za učenje?

Overview/Description To explain the elements of 4G communication systems Target Audience Technical professionals; IT and business managers who need to learn about emerging broadband wireless technologies; students studying or researching broadband wireless communications and technologies Prerequisites An understanding of the basic concepts of cellular, mobile, and fixed wireless technology and the fundamental principles underpinning their operation Expected Duration (hours) 2.3 Lesson Objectives4G Communication Systems recognize potential future developments in wireless services. identify the...
Overview/Description To outline 4G wireless networks and applications Target Audience Technical professionals; IT and business managers who need to learn about emerging broadband wireless technologies; students studying or researching broadband wireless communications and technologies Prerequisites An understanding of the basic concepts of cellular, mobile, and fixed wireless technology and the fundamental principles underpinning their operation Expected Duration (hours) 2.2 Lesson Objectives4G Implementations recognize the challenges to 4G migration and identify possible solutions. recognize...
Overview/Description To describe B3G technologies Target Audience Technical professionals; IT and business managers who need to learn about emerging broadband wireless technologies; students studying or researching broadband wireless communications and technologies Prerequisites An understanding of the basic concepts of cellular, mobile, and fixed wireless technology and the fundamental principles underpinning their operation Expected Duration (hours) 2.6 Lesson ObjectivesBeyond 3G (B3G) recognize the evolution of cellular systems. recognize the technologies involved in future wireless...
Overview/Description IS Governance is an incredibly important part of IS security. Management and monitoring of resources are built into the audit process and the CISA must be aware of the role they will play in the process. This course examines the role of Governance, IT Management and IT Monitoring, and the strategies and models used to evaluate and create policies and procedures within the environment. This course also examines the Risk Management strategies that can be used, and how the CISA plays a role in choosing the correct strategy for the environment. The Certified Information...
Overview/Description Information Security Management Practices should adhere to the business goals of an organization, aligning to the objectives that management set down for company improvement. This course examines different types of management practices such as human resource management, sourcing management, change management, financial management, and quality management. This course also looks at how segregation of duties is used to better control information security. Finally, this course examines business continuity and impact analysis and how it can be used as part of information...
Overview/Description Business Application Systems play a substantial role in many corporate infrastructures today. This course examines the role of the auditor in environments where business application systems and agile development systems are being used. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to...
Overview/Description This course examines the auditor's role in auditing physical and software infrastructures and the maintenance of those infrastructures. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization's information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination. Target Audience Information Systems professionals with an...
Overview/Description The acquisition, development, and management of business projects are important in all information systems builds. The CISA must make sure that all these aspects are brought together, and that the business model of the organization is adhered to at all times during this process. This course examines how business realization is applied, how project management structures are built, and how project management practices are used to correctly implement the project management structures. This course also examines the business applications that are used, and the processes that...
Overview/Description Enterprise network infrastructures and architectures are an integral part of enterprise environments today and are widely unknown to most users. The IS auditor must have a high level knowledge of these frameworks and a clear communication path to those who control them. This course examines the types of networks that are commonly found in enterprises today and the services and components that are commonly used in them. This course also examines disaster recovery strategies and scenarios that must be put in place to deal with any emergency situations that may occur. The...
Overview/Description While performing audits, it is extremely important to classify audit information and to evaluate and document both the controls used and the outcomes of all parts of the audit process. This course examines the audit classification process, how risk-based auditing is performed, how compliance testing is used, and the processes and procedures used to evaluate and document the audit process. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?