Certified Information Systems Auditor CISA (Part 1 of 2)
4.2 (805 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,299 students enrolled

Certified Information Systems Auditor CISA (Part 1 of 2)

Certified Information Systems Auditor (CISA) Certification Prep Course
4.2 (805 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,299 students enrolled
Last updated 9/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 11 hours on-demand video
  • 5 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • After successfully completing this course, the students will be able to understand the six domains covered in the CISA exam:
  • IT audit process
  • IT governance
  • Systems and infrastructure lifecycle management
  • IT service delivery and support
  • Protection of information assets
  • Business continuity and disaster recovery
Requirements
  • The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
  • This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.
Description

The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.


Who this course is for:
  • IT audit, control, assurance, and security professionals
  • IT consultants, auditors, and managers
  • Security policy writers
  • Privacy officers
  • Information security officers
  • Network and system administrators
  • Network security engineers
Course content
Expand all 535 lectures 11:11:38
+ Module 01 -The Process of Auditing Information Systems
152 lectures 03:42:16

Download Supporting files here

Preview 01:51
Lesson 1: Management of the Audit Function
01:40
Organization of the IS Audit Function
03:12
Audit Planning Part1
01:08
Audit Planning Part2
01:48
Audit Planning Part3
01:32
Audit Planning Part4
01:07
Audit Planning Part5
02:01
Effect of Laws and Regulations on IS Audit Planning Part1
02:17
Effect of Laws and Regulations on IS Audit Planning Part2
00:56
Effect of Laws and Regulations on IS Audit Planning Part3
00:41
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
02:02
ISACA IT Audit and Assurance Standards and Guidelines Part2
03:25
ISACA IT Audit and Assurance Standards and Guidelines Part3
00:41
ISACA IT Audit and Assurance Standards and Guidelines Part4
00:36
Auditing Standards Part1
01:53
Auditing Standards Part2
01:05
Auditing Standards Part3
02:45
Auditing Standards Part4
00:28
Auditing Standards Part5
01:58
Auditing Standards Part6
01:25
Auditing Standards Part7
02:00
Auditing Standards Part9
01:05
Audit Guidelines Part1
00:33
Audit Guidelines Part2
01:07
Audit Guidelines Part3
01:38
Audit Guidelines Part4
03:07
Audit Guidelines Part5
01:57
Audit Guidelines Part6
01:28
Audit Guidelines Part7
01:41
Audit Guidelines Part8
01:58
Audit Guidelines Part9
01:57
Audit Guidelines Part10
01:31
Audit Guidelines Part12
02:02
Audit and Assurance Tools and Techniques
00:45
Relationship Among Standards, Guidelines, and Tools and Techniques
01:29
Information Technology Assurance Framework
00:26
Information Technology Assurance Framework Components
02:23
ITAF General Standards (Section 2200) Part1
01:27
ITAF General Standards (Section 2200) Part2
01:21
ITAF Performance Standards (Section 2400) Part1
03:02
ITAF Performance Standards (Section 2400) Part2
02:02
ITAF Performance Standards (Section 2400) Part3
00:33
ITAF Performance Standards (Section 2400) Part4
01:10
Reporting Standards (Section 2600) Part1
00:21
Reporting Standards (Section 2600) Part2
00:51
Reporting Standards (Section 2600) Part3
00:54
IT Assurance Guidelines (Section 3000) Part1
01:15
IT Assurance Guidelines (Section 3000) Part2
00:51
IT Assurance Guidelines (Section 3000) Part3
01:30
IT Assurance Guidelines (Section 3000) Part4
01:31
IT Assurance Guidelines (Section 3000) Part5
02:06
IT Assurance Guidelines (Section 3000) Part6
00:20
IT Assurance Guidelines (Section 3000) Part7
01:22
IT Assurance Guidelines (Section 3000) Part8
02:11
IT Assurance Guidelines (Section 3000) Part9
00:45
IT Assurance Guidelines (Section 3000) Part10
01:58
IT Assurance Guidelines (Section 3000) Part11
01:40
Lesson 3: Risk Analysis
00:40
Risk Analysis Part1
04:21
Risk Analysis Part2
03:06
Risk Analysis Part3
02:32
Risk Analysis Part4
01:26
Risk Analysis Part5
01:31
Risk Analysis Part6
04:10
Risk Analysis Part7
03:31
Lesson 4: Internal Controls
01:31
Internal Control Objectives
01:05
IS Control Objectives Part1
02:34
IS Control Objectives Part2
01:19
IS Control Objectives Part3
02:06
COBIT
00:35
General Controls Part1
00:48
General Controls Part2
03:23
IS Controls
03:40
Lesson 5: Performing An IS Audit
02:40
Performing an IS Audit
01:08
Classification of Audits
02:32
Audit Programs Part1
01:07
Audit Programs Part2
02:56
Audit Methodology Part1
03:02
Audit Methodology Part2
01:54
Audit Methodology Part3
01:26
Fraud Detection Part1
03:25
Fraud Detection Part2
02:13
Risk-Based Auditing Part1
01:12
Risk-Based Auditing Part2
00:53
Risk-Based Auditing Part3
00:57
Audit Risk and Materiality Part1
01:11
Audit Risk and Materiality Part2
01:18
Audit Risk and Materiality Part3
01:36
Audit Risk and Materiality Part4
01:05
Audit Risk and Materiality Part5
00:23
Risk Assessment and Treatment Part1
00:39
Risk Assessment and Treatment Part2
00:56
Risk Assessment and Treatment Part3
01:57
Risk Assessment and Treatment Part4
01:46
Risk Assessment and Treatment Part5
00:45
Risk Assessment Techniques Part1
02:04
Risk Assessment Techniques Part2
00:47
Risk Assessment Techniques Part3
00:18
Risk Assessment Techniques Part4
00:39
Audit Objectives Part1
01:06
Audit Objectives Part2
00:40
Compliance Versus Substantive Testing Part1
01:09
Compliance Versus Substantive Testing Part2
00:35
Compliance Versus Substantive Testing Part3
00:31
Evidence Part1
00:58
Evidence Part2
01:57
Evidence Part3
01:13
Interviewing and Observing Personnel in the Performance Of Their Duties
01:09
Sampling Part1
01:21
Sampling Part2
02:19
Sampling Part3
01:56
Using The Services Of Other Auditors And Experts Part1
02:04
Using The Services Of Other Auditors And Experts Part2
00:30
Computer-Assisted Audit Techniques (CAAT) Part1
00:43
Computer-Assisted Audit Techniques (CAAT) Part2
00:24
Evaluation Of Audit Strengths And Weaknesses Part1
00:48
Evaluation Of Audit Strengths And Weaknesses Part2
02:02
Evaluation Of Audit Strengths And Weaknesses Part3
00:57
Communicating Audit Results Part1
00:40
Communicating Audit Results Part2
01:26
Communicating Audit Results Part3
00:25
Management Implementation Of Recommendations
00:21
Audit Documentation
01:15
Lesson 6: Control Self-Assessment Part1
00:50
Control Self-Assessment Part2
01:12
Control Self-Assessment Part3
01:38
Objectives of CSA
01:19
Benefits of CSA
00:56
Disadvantages of CSA
00:37
Auditor Role in CSA
01:21
Technology Drivers for CSA
01:07
Traditional Versus CSA Approach
00:36
Lesson 7: The Evolving IS Audit Process
00:09
Automated Work Papers Part1
01:20
Automated Work Papers Part2
01:22
Integrated Auditing Part1
01:32
Integrated Auditing Part2
00:38
Integrated Auditing Part3
00:24
Continuous Auditing Part1
00:41
Continuous Auditing Part2
01:02
Continuous Auditing Part3
00:48
Continuous Auditing Part4
02:12
Continuous Auditing Part5
00:46
Module 01 Review
01:37
Module 01 - Quiz
11 questions
+ Module 02 - Governance and Management of IT
133 lectures 03:41:17

Download Supporting files here

Introduction
03:12
Lesson 1: Corporate Governance
00:17
Corporate Governance Part1
00:25
Corporate Governance Part2
00:33
Corporate Governance Part3
01:33
Lesson 2: IT Governance
01:02
IT Governance Part1
00:23
IT Governance Part2
00:23
Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
00:31
IT Monitoring and Assurance Practices for Board and Senior Management Part1
02:03
IT Monitoring and Assurance Practices for Board and Senior Management Part2
01:01
IT Monitoring and Assurance Practices for Board and Senior Management Part3
00:45
Best Practices for IT Governance Part1
02:29
Best Practices for IT Governance Part2
00:43
Best Practices for IT Governance Part3
03:15
Best Practices for IT Governance Part4
00:53
IT Governance Frameworks
01:30
Audit Role in IT Governance Part1
00:37
Audit Role in IT Governance Part2
01:17
Audit Role in IT Governance Part3
01:16
Audit Role in IT Governance Part4
00:32
IT Strategy Committee
01:14
IT Balanced Scorecard Part1
00:34
IT Balanced Scorecard Part2
04:03
Information Security Governance Part1
01:35
Information Security Governance Part2
01:46
Information Security Governance Part3
03:10
Information Security Governance Part4
01:22
Importance of Information Security Governance Part1
01:10
Importance of Information Security Governance Part2
02:08
Outcomes of Security Governance Part1
01:04
Outcomes of Security Governance Part2
00:48
Effective Information Security Governance
00:52
Roles and Responsibilities of Senior Management and Board of Directors Part1
00:58
Roles and Responsibilities of Senior Management and Board of Directors Part2
02:09
Enterprise Architecture
00:45
Lesson 4: Information Systems Strategy
02:10
Strategic Planning Part1
00:57
Strategic Planning Part2
00:42
Steering Committee
01:34
Lesson 5: Maturity and Process Improvement Models
00:42
Maturity and Process Improvement Models
00:37
Lesson 6: IT Investment and Allocation Practices
01:34
IT Investment and Allocation Practices Part1
00:14
IT Investment and Allocation Practices Part2
00:49
IT Investment and Allocation Practices Part3
00:24
IT Investment and Allocation Practices Part4
01:23
Implement IT Portfolio Management
00:48
IT Portfolio Management Versus Balanced Scorecard
00:29
Lesson 7: Policies and Procedures
00:11
Policies Part1
00:43
Policies Part2
02:32
Policies Part3
01:20
Information Security Policy Part1
00:58
Information Security Policy Part2
01:33
Information Security Policy Part3
00:31
Information Security Policy Part4
02:52
Information Security Policy Part5
01:35
Information Security Policy Part6
00:29
Information Security Policy Part7
01:49
Procedures Part1
02:30
Procedures Part2
01:31
Lesson 8: Risk Management
02:01
Risk Management
03:27
Developing a Risk Management Program
02:37
Risk Management Process Part1
00:58
Risk Management Process Part2
01:56
Risk Management Process Part3
02:28
Risk Management Process Part4
01:58
Risk Management Process Part5
02:19
Risk Management Process Part6
00:59
Risk Analysis Methods Part1
00:13
Risk Analysis Methods Part2
02:14
Risk Analysis Methods Part3
00:47
Risk Analysis Methods Part4
05:30
Risk Analysis Methods Part5
03:49
Lesson 9: IS Management Practices
00:23
Human Resource Management Part1
00:16
Human Resource Management Part2
02:23
Human Resource Management Part3
04:09
Human Resource Management Part4
04:14
Human Resource Management Part5
01:26
Human Resource Management Part6
03:47
Human Resource Management Part7
02:52
Human Resource Management Part8
04:14
Human Resource Management Part9
01:46
Human Resource Management Part10
01:17
Human Resource Management Part11
01:49
Human Resource Management Part12
02:02
Human Resource Management Part13
00:54
Human Resource Management Part14
01:55
Organizational Change Management
02:23
Financial Management Practices
02:32
Quality Management Part1
00:57
Quality Management Part2
02:48
Quality Management Part3
01:56
Information Security Management
00:49
Performance Optimization Part1
01:26
Performance Optimization Part2
03:26
Performance Optimization Part3
00:20
Lesson 10: IS Organizational Structure and Responsibilities
00:54
IS Roles and Responsibilities Part1
02:29
IS Roles and Responsibilities Part2
01:33
IS Roles and Responsibilities Part3
01:16
Segregation of Duties
00:36
Segregation of Duties Controls Part1
02:33
Segregation of Duties Controls Part2
03:11
Compensating Controls for Lack of Segregation
04:34
Lesson 11: Auditing IT Governance Structure and Implementation
01:05
Reviewing Documentation Part1
00:49
Reviewing Documentation Part2
00:53
Reviewing Contractual Commitments
03:55
Lesson 12: Business Continuity Planning Part1
06:12
Business Continuity Planning Part2
01:10
Business Continuity Planning Part3
01:51
IS Business Continuity Planning
00:53
Disasters and Other Disruptive Events Part1
02:26
Disasters and Other Disruptive Events Part2
02:01
Business Continuity Planning Process
03:19
Business Continuity Policy
01:13
Business Impact Analysis Part1
01:38
Business Impact Analysis Part2
00:46
Classification of Operations and Criticality Analysis
00:58
Development of Business Continuity Plans
02:31
Other Issues and Plan Development
00:48
Components of a BCP Part1
01:14
Components of a BCP Part2
02:08
BCP Testing Part1
01:43
BCP Testing Part2
01:29
BCP Testing Part3
00:33
BCP Maintenance
00:53
Summary of BCP
00:42
Module 02 Review
02:26
Module 02 - Quiz
8 questions
+ Module 03 - Information Systems Acquisition, Development and Implementation
209 lectures 03:12:01

Download Supporting files here

Lesson 1: Business Realization Part1
01:09
Business Realization Part2
01:28
Portfolio/Program Management Part1
00:36
Portfolio/Program Management Part2
01:06
Portfolio/Program Management Part3
00:44
Portfolio/Program Management Part4
00:37
Portfolio/Program Management Part5
00:58
Business Case Development and Approval Part1
01:12
Business Case Development and Approval Part2
00:52
Benefits Realization Techniques
01:37
Lesson 2: Project Management Structure
00:38
Project Context and Environment
00:34
Project Organizational Forms Part1
00:14
Project Organizational Forms Part2
00:49
Project Communication and Culture
01:28
Project Objectives Part1
00:40
Project Objectives Part2
00:35
Project Objectives Part3
00:47
Roles and Responsibilities of Groups and Individuals Part1
00:49
Roles and Responsibilities of Groups and Individuals Part2
00:27
Roles and Responsibilities of Groups and Individuals Part3
01:20
Lesson 3: Project Management Practices
00:46
Initiation of a Project
00:20
Project Planning
02:01
Example of Project Management for New Software
01:44
Software Size Estimation
01:08
Lines of Source Code
00:40
Function Point Analysis (FPA)
00:37
Function Points
00:51
Cost Budgets
00:58
Software Cost Estimation
00:44
Scheduling and Establishing the Timeframe
00:39
Critical Path Methodology
01:22
Gantt Charts
00:51
Program Evaluation Review Technique (PERT)
00:45
Time Box Management
00:51
General Project Management
00:18
Project Controlling Part1
00:21
Project Controlling Part2
00:41
Management of Resource Usage
00:38
Management of Risk Part1
00:35
Management of Risk Part2
00:37
Closing a Project
00:39
Lesson 4: Business Application Development Part1
00:41
Business Application Development Part2
01:06
Business Application Development Part3
00:19
Business Application Development Part4
02:14
Business Application Development Part5
00:50
Traditional SDLC Approach
00:55
SDLC Phases
00:23
SDLC
01:11
Integrated Resource Management Systems Part1
01:08
Integrated Resource Management Systems Part2
00:50
Integrated Resource Management Systems Part3
00:29
Description of SDLC Phases Part1
01:04
Description of SDLC Phases Part2
01:45
Description of SDLC Phases Part3
01:52
Description of SDLC Phases Part4
01:16
Description of SDLC Phases Part5
00:45
Description of SDLC Phases Part6
01:08
Description of SDLC Phases Part7
00:45
Description of SDLC Phases Part8
01:09
Description of SDLC Phases Part9
00:51
Description of SDLC Phases Part10
01:11
Description of SDLC Phases Part11
02:56
Description of SDLC Phases Part12
01:07
Description of SDLC Phases Part13
01:41
Description of SDLC Phases Part14
01:17
Description of SDLC Phases Part15
01:02
Description of SDLC Phases Part16
00:51
Description of SDLC Phases Part17
00:10
Description of SDLC Phases Part18
01:41
Description of SDLC Phases Part19
01:22
Description of SDLC Phases Part20
01:41
Description of SDLC Phases Part21
01:08
Description of SDLC Phases Part22
01:43
Description of SDLC Phases Part23
01:38
Risks Associated with Software Development Part1
01:26
Risks Associated with Software Development Part2
00:37
Lesson 5: Business Application Systems
00:13
Electronic Commerce
00:27
E-Commerce Models
01:12
E-Commerce Architectures
00:55
E-Commerce Risks
00:51
E-Commerce Requirements
00:47
E-Commerce Audit and Control Issues or Best Practices
00:32
Components of PKI
02:20
Electronic Data Interchange
00:51
General Requirements of EDI
00:50
Traditional EDI
01:13
Web Based EDI
00:43
EDI Risks and Controls
01:03
Controls in EDI Environment Part1
00:38
Controls in EDI Environment Part2
00:40
Controls in EDI Environment Part3
00:43
Controls in EDI Environment Part4
00:43
E-Mail
00:54
E-Mail Security Issues
01:37
Standards for E-Mail Security Part1
00:39
Standards for E-Mail Security Part2
00:55
Standards for E-Mail Security Part3
01:28
Point-Of-Sale Systems (POS)
00:53
Electronic Banking Part1
01:57
Electronic Banking Part2
00:39
Risk Management Challenges in E-Banking
00:51
Risk Management Controls for E-Banking Part1
00:55
Risk Management Controls for E-Banking Part2
00:19
Electronic Finance
00:41
Payment Systems
00:21
Electronic Money Model
00:16
Electronic Checks Model
00:28
Electronic Transfer Model
00:11
Electronic Funds Transfer
00:28
Controls in an EFT Environment Part1
00:42
Controls in an EFT Environment Part2
00:48
Automated Teller Machines Part1
00:47
Automated Teller Machines Part2
00:55
Image Processing Part1
01:10
Image Processing Part2
01:14
Business Intelligence
01:12
Decision Support System (DSS)
00:31
DSS Frameworks
00:29
Customer Relation Management (CRM)
00:26
Supply Chain Management (SCM)
01:11
Lesson 6: Alternative Forms of Software Project Organization Part1
00:26
Alternative Forms of Software Project Organization Part2
00:24
Alternative Forms of Software Project Organization Part3
00:48
Agile Development
00:27
Prototyping
00:37
Rapid Application Development (RAD)
01:00
Lesson 7: Alternative Development Methods
00:48
Data Oriented System Development
00:36
Object Oriented System Development Part1
01:34
Object Oriented System Development Part2
02:12
Component-Based Development
02:30
Web-Based Application Development
01:36
Software Reengineering
00:11
Reverse Engineering
01:19
Lesson 8: Infrastructure Development/Acquisition Practices Part1
00:30
Infrastructure Development/Acquisition Practices Part2
00:35
Infrastructure Development/Acquisition Practices Part3
01:03
Project Phases of Physical Architecture Analysis Part1
01:20
Project Phases of Physical Architecture Analysis Part2
00:26
Planning Implementation of Infrastructure Part1
00:28
Planning Implementation of Infrastructure Part2
00:27
Critical Success Factors
00:22
Hardware Acquisition
00:52
Acquisition Steps Part1
01:01
Acquisition Steps Part2
00:50
System Software Acquisition
00:27
System Software Implementation
00:15
System Software Change Control Procedures
00:28
Lesson 9: Information Systems Maintenance Practices
00:55
Change Management Process Overview
00:37
Deploying Changes
01:04
Documentation
00:50
Testing Changed Programs
00:31
Auditing Program Changes
00:45
Emergency Changes
02:28
Change Exposures (Unauthorized Changes)
01:10
Configuration Management Part1
00:55
Configuration Management Part2
00:36
Lesson 10: System Development Tools And Productivity Aids
00:31
Code Generators
00:16
Computer Aided Software Engineering Part1
01:06
Computer Aided Software Engineering Part2
00:36
Computer Aided Software Engineering Part3
00:32
Fourth-Generation Languages (4GL) Part1
01:05
Fourth-Generation Languages (4GL) Part2
01:21
Lesson 11: Business Process Reengineering And Process Change Projects
01:04
Business Process Reengineering And Process Change Projects Continued
00:49
Benchmarking Process Part1
00:35
Benchmarking Process Part2
00:31
The Benchmarking Process
00:54
ISO 9126
00:46
Software Capability Maturity Model
02:31
ISO 15504
00:42
Lesson 12: Application Controls
00:39
Inputs Controls Part1
01:04
Inputs Controls Part2
00:39
Inputs Controls Part3
00:29
Inputs Controls Part4
00:40
Processing Procedures And Controls
01:10
Processing Controls
00:35
Data File Control Procedures
00:39
Output Controls Part1
00:10
Output Controls Part2
00:34
Business Process Control Assurance
00:48
Lesson 13: Auditing Application Controls Part1
00:31
Auditing Application Controls Part2
00:46
Risk Assessment Model To Analyze Application Controls
01:00
Observing And Testing User Performing Procedures
00:50
Data Integrity Testing
00:49
Example Of Referential And Relational Integrity
04:26
Data Integrity In Online Transaction Processing Systems
02:07
Test Application Systems
00:15
Continuous Online Auditing
00:33
Online Auditing Techniques
01:19
Lesson 14: Auditing Systems Development, Acquisition And Maintenance
01:07
Project Management
00:40
Feasibility Study
00:33
Requirements Definition
00:41
Software Acquisition Process
00:38
Detailed Design And Development
00:51
Testing
00:43
Implementation Phase
00:42
Post Implementation Review
00:46
System Change Procedures And The Program Migration Process
00:37
Module 03 Review
01:22
Module 03 - Quiz-
9 questions
+ Module 04 - Information Systems Operations, Maintenance and Support
39 lectures 32:26

Download Supporting files here

Introduction
00:48

Download Supporting files here

Lesson 1: Information Systems Operations
00:27
Management of IS Operations
00:45
Service Management Part1
00:34
Service Management Part2
01:08
Service Management Part3
00:42
Service Management Part4
00:31
Service Management Part5
00:23
Service Level Part1
00:52
Service Level Part2
00:24
Infrastructure Operations
00:38
Scheduling Part1
00:22
Scheduling Part2
01:04
Monitoring Use of Resources
00:31
Process of Incident Handling
00:24
Problem Management
00:58
Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions
01:05
Support/Helpdesk Part1
01:15
Support/Helpdesk Part2
00:53
Change Management Process Part1
00:42
Change Management Process Part2
00:40
Release Management Part1
00:52
Release Management Part2
01:15
Information Security Management
00:40
Media Sanitization
01:37
Lesson 2: Information Systems Hardware
00:33
Computer Hardware Components and Architecture
01:10
Common Enterprise Backend Devices
01:37
Specialized Devices
01:09
Risks
00:43
Security Control
01:01
Radiofrequency Identification
00:33
RFID Applications
00:45
RFID Risks
00:48
RFID Security Control
00:37
Hardware Maintenance Program
01:09
Hardware Monitoring Procedures
00:54
Capacity Management Part1
00:57
Capacity Management Part2
01:00