Stanislav Zubkov's Technical Blog
Security Solutions
Main menu
Skip to content
CISA
1. INFORMATION SYSTEMS AUDITING PROCESS
Audit management
Internal Controls
Risk Analyze
Performing an Audit
IS Audit
Types of Audits
Formal Planning
Audit Risk and Materiality
Audit Methodology
Audit Evidence
Audit Data Analytics
Testing
Control Self-Assessments (CSA)
2. GOVERNANCE AND MANAGEMENT OF IT
3. INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND IMPLEMENTATION
4. INFORMATION SYSTEMS OPERATIONS AND BUSINESS RESILIENCE
5. PROTECTION OF INFORMATION ASSETS
CISM
AD RMS
AD Rights Management Server
AD RMS root cluster installation
AD RMS licensing cluster installation
AD RMS: Machine activation. Independent process.
AD RMS: Document protection overview.
AD RMS: Client machine activation
AD RMS: Document consumption overview.
EV
Symantec Enterprise Vault: filtering features. Theory.
Perfect
Perfect
Share this:
Twitter
Facebook
Like this:
Like
Loading...
Follow
Following
Stanislav Zubkov's Technical Blog
Sign me up
Already have a WordPress.com account?
Log in now.
Stanislav Zubkov's Technical Blog
Customize
Follow
Following
Sign up
Log in
Copy shortlink
Report this content
View post in Reader
Manage subscriptions
Collapse this bar
Loading Comments...
Write a Comment...
Email (Required)
Name (Required)
Website
%d
bloggers like this: