Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,209,567 members, 8,006,452 topics. Date: Tuesday, 19 November 2024 at 05:18 AM

J123's Posts

Nairaland Forum / J123's Profile / J123's Posts

(1) (2) (of 2 pages)

Education / CISA Lecture Without Boarder! by J123: 8:18am On Jun 08, 2017
Dear Professionals,

Recovery Time Objectives (RTO) is the time period after disaster in which normal business functionality needs to be restored while Recovery Point Objective (RPO) is the point to which data must be restored after a disaster so as to resume processing transactions.

In view of this, the following recovery strategies can be adopted based on the Business Impact Analysis (BIA) perfomed:

1. Redundant Site

2. Hot Site

3. Warm Site

4. Cold Site

In addition, backups should be performed in a way that the latest backup is no older than the maximum time frame.

But it had been observed that most of our businesses do not have a proper Disaster Recovery Plan or Business Continuity Plan to support their businesses following a major disaster. How can this be corrected?!

Learnt this & more in our Online CISA lecture BATCH B starting this weekend for both Sept & Dec Diets. More people are joining daily.

No location or geographical barrier!

Don't be left out!!!

For enquiries , Call/WhatsApp: 07019402526
Educational Services / CISA Lecture Without Boarder! by J123: 10:19pm On Jun 07, 2017
Dear Professionals,

Recovery Time Objectives (RTO) is the time period after disaster in which normal business functionality needs to be restored while Recovery Point Objective (RPO) is the point to which data must be restored after a disaster so as to resume processing transactions.

In view of this, the following recovery strategies can be adopted based on the Business Impact Analysis (BIA) perfomed:

1. Redundant Site

2. Hot Site

3. Warm Site

4. Cold Site

In addition, backups should be performed in a way that the latest backup is no older than the maximum time frame.

But it had been observed that most of our businesses do not have a proper Disaster Recovery Plan or Business Continuity Plan to support their businesses following a major disaster. How can this be corrected?!

Learnt this & more in our Online CISA lecture BATCH B starting this weekend for Sept & Dec Diets. More people are joining daily.

No location or geographical barrier!

Don't be left out!!!

For enquiries , Call/WhatsApp: 07019402526
Education / CISA Lecture Without Boarder! by J123: 9:30pm On Jun 07, 2017
Dear Professionals,

Recovery Time Objectives (RTO) is the time period after disaster in which normal business functionality needs to be restored while Recovery Point Objective (RPO) is the point to which data must be restored after a disaster so as to resume processing transactions.

In view of this, the following recovery strategies can be adopted based on the Business Impact Analysis (BIA) perfomed:

1. Redundant Site

2. Hot Site

3. Warm Site

4. Cold Site

In addition, backups should be performed in a way that the latest backup is no older than the maximum time frame.

But it had been observed that most of our businesses do not have a proper Disaster Recovery Plan or Business Continuity Plan to support their businesses following a major disaster. How can this be corrected?!

Learnt this & more in our Online CISA lecture BATCH B starting this weekend for Sept & Dec Diets. More people are joining daily.

No location or geographical barrier!

Don't be left out!!!

For enquiries , Call/WhatsApp: 07019402526
Educational Services / Re: Oya Come And Help by J123: 11:48am On Feb 27, 2017
Go for CISA. Contact me on 07019402526 for details
Educational Services / CISA Lecture @ Your Doorstep!!! by J123: 11:46am On Feb 27, 2017
Remember, the forecasted outlook of our economy in the next six month is now looking stronger. Take advantage of this by preparing for the impending opportunities by registering for CISA—one of the most globally recognized IS/IT certifications in the world.

Demonstrate your experience and skills in information systems audit, control, security and cyber security. Start now by registering to take ISACA®'s globally recognized Certified Information Systems Auditor® (CISA®)

Adding CISA to your resume/CV, business card and company bio will enable you to stand out throughout your career as having the required expertise and experience to:

- Stand out as a true expert.
- Go farther in your current role.
- Capitalize on new career-advancing opportunities as they arise.
- Establish trust and credibility.

In view of the above, we hereby offer you an Initiative to help you achieve this goal.

We have lined up for you:

Our online CISA lecture will allow you to combine your busy schedule with allocation of your time in receiving training on how to pass this exam with ease anywhere you are, at the comfort of your home/office.

Subscribe to our online CISA lecture today & benefit from loads of study materials to be provided to aid your learning + ISACA Q&A database.

For enquiry: call/whatsapp: 07019402526

Come, let's assist you in taking your career to greater level.

P.S: Remember, if opportunity doesn’t knock, you can build a door!
Educational Services / Re: CISA Lecture Made Easy!!! by J123: 9:41am On Feb 10, 2017
@ Demulsify, kindly get in touch me with tru 07019402526. thanks
Educational Services / CISA Lecture Made Easy!!! by J123: 11:35am On Feb 09, 2017
Are you looking for a way to write CISA (Certified Information Systems Auditor) Exam but have no time to attend classroom lectures?!

*Even if you don't want to write the exam now, you can still add the CISA Lecture training in your CV to boost your chances.*


Here is an Initiative designed for you to listen to lectures in the comfort of your home and, or offices, with the benefits of repeating any of audio lectures on as-you-want-it basis & at your own pace.

Subscribe to our online CISA lecture today & benefit from loads of study materials to be provided to aid your learning + ISACA Q&A database.

For enquiry: call/whatsapp: 07019402526

Come, let's assist you in taking your career to greater level.

We are starting fully this weekend! Don't miss it!
Educational Services / Why You Need To Be A CISA! by J123: 10:55am On Jan 26, 2017
Do you know that IT Auditing and Cyber Security is an extremely hot career choice that mixes aspects of MIS, Finance, Risk, and Accounting? Take charge with specialized expertise that stands out from the crowd. Gain the knowledge and skills needed to complete your ISACA Certification – CISA (Certified Information System Auditors).

With ISACA® certifications which is a globally accepted certifications,You’ll be on your way to obtaining the certification that affirms you as one of the world’s most-qualified information systems audit and control professionals.

Contemplating about how to write 2017 CISA Diet Exams?!

Don't hesitate to join our online CISA lecture for quality lecture contents with 80% success rate. Testimonials of our students are there to back up our claims.

So subscribe to our online CISA lecture today to learn more about CISA & enjoy the following:

* Free registration for our students.

* Maximum use of the audio function in WhatsApp, enabling you to listen to the lectures over and over again.

* Detailed review of over 200 CISA questions.

* Multitudes of case studies to drive home the points.

* Access to study materials to aid your learning.

*Great opportunity for candidates without access to tuition providers.

*Great opportunity for executives with busy schedules.

*ISACA Q&A Database for timing practicing & precision including exam mode also available.

*Free ISACA registration for our students

*Bonus Material on certified Ethical Hackers (CEH)

Stand out from the competition with the breadth of knowledge and dedicated skills of ISACA Certification in IT Auditing and Cyber Security—and secure a successful future!!!

For details, call/whatsapp: 07019402526
Educational Services / Be A CISA In 2017:defending Our Privacy—a True Story by J123: 12:07pm On Jan 11, 2017
George speaks aloud on a mobile phone on the train from Turin to Rome, Italy. He states his name and his initials are also on his luggage tag. He speaks of money, houses, restructuring. He seems to be handling a lot of money with aplomb. Very likely, it is not his own money.

He calls his mother to greet her and it seems that he is asking for money. An observer surmises he is obviously an ambitious young man, but perhaps also a rascal? He talks to friends and to his mother of pending contracts that would put a considerable amount of money at his disposal and advises his mother that, in the meantime, she should wait with anticipation.

The observer assumes that he deals with finances; more precisely, in speculative investments—perhaps for wealthy investors who want to leverage their assets or something related to money laundering. It makes one think of the Italian Parioli Madoff: a man who tried to emulate the “original” Bernie Madoff and is now spending the rest of his life in jail. It is an automatic comparison.

He states in his phone call that he is going to Milan, his home city. The observer now has enough information to begin intelligence work via the Internet. For added security, the observer waits until George gets off the train.

One can find almost anything on the Internet such as Linkedin, Facebook and a host of others. It takes only a little searching. And everything that is on the Internet remains there forever without any chance of eradication.

To this end;Privacy is threatened every day, not only when users are online, but in real life. Everything a person does can be used to gather private information about him/her, and the wide usage of mobile phones makes the situation even worse.

In view of the above, organizations can help fight privacy invaders by teaching their employees how to protect themselves when talking about their job and when online, but the first line of defence remains the individual. Individuals must always consider that everything they say is heard by others, and, perhaps those “others” are not all friendly. The Internet accelerates information retrieval and correlation.

So how do you protect yourself or your organization from these threats of intruding into our privacy?

The best advice is to be a CISA (Certified Information System Auditor) & know how to:
- Use a virtual private network (VPN), which passes Internet traffic through different servers around the world.

- Alternatively—or together with a VPN—use TOR. TOR encrypts and bounces Internet traffic through different servers, making it difficult, but not impossible, to track.

- Use an encrypted message application. Although the content of a person’s chats in Facebook Messenger or WhatsApp can be accessed only by hacking your phone, it might be advisable to start using a more secure messaging app to ensure that what is stored on the various servers is not accessible.

- Think about why it is desirable to stay private. It is important that people think about what data they have, what data they want to protect, how likely it is that that data could get into the wrong hands and how serious that would be if it happened.

- Protect passwords. Change them often and do not use the same password for all accounts.

- And stop playing with global positioning systems (GPS) and other devices that let the entire world know where you are and with whom.

- And many more.

So, Don’t hesitate to subscribe to our Online CISA Lecture towards taking your CISA exam. For more details, call/whataspp: 07019402526
Education / Be A CISA In 2017:defending Our Privacy—a True Story by J123: 11:53am On Jan 11, 2017
George speaks aloud on a mobile phone on the train from Turin to Rome, Italy. He states his name and his initials are also on his luggage tag. He speaks of money, houses, restructuring. He seems to be handling a lot of money with aplomb. Very likely, it is not his own money.

He calls his mother to greet her and it seems that he is asking for money. An observer surmises he is obviously an ambitious young man, but perhaps also a rascal? He talks to friends and to his mother of pending contracts that would put a considerable amount of money at his disposal and advises his mother that, in the meantime, she should wait with anticipation.

The observer assumes that he deals with finances; more precisely, in speculative investments—perhaps for wealthy investors who want to leverage their assets or something related to money laundering. It makes one think of the Italian Parioli Madoff: a man who tried to emulate the “original” Bernie Madoff and is now spending the rest of his life in jail. It is an automatic comparison.

He states in his phone call that he is going to Milan, his home city. The observer now has enough information to begin intelligence work via the Internet. For added security, the observer waits until George gets off the train.

One can find almost anything on the Internet such as Linkedin, Facebook and a host of others. It takes only a little searching. And everything that is on the Internet remains there forever without any chance of eradication.

To this end;Privacy is threatened every day, not only when users are online, but in real life. Everything a person does can be used to gather private information about him/her, and the wide usage of mobile phones makes the situation even worse.

In view of the above, organizations can help fight privacy invaders by teaching their employees how to protect themselves when talking about their job and when online, but the first line of defence remains the individual. Individuals must always consider that everything they say is heard by others, and, perhaps those “others” are not all friendly. The Internet accelerates information retrieval and correlation.

So how do you protect yourself or your organization from these threats of intruding into our privacy?

The best advice is to be a CISA (Certified Information System Auditor) & know how to:
- Use a virtual private network (VPN), which passes Internet traffic through different servers around the world.

- Alternatively—or together with a VPN—use TOR. TOR encrypts and bounces Internet traffic through different servers, making it difficult, but not impossible, to track.

- Use an encrypted message application. Although the content of a person’s chats in Facebook Messenger or WhatsApp can be accessed only by hacking your phone, it might be advisable to start using a more secure messaging app to ensure that what is stored on the various servers is not accessible.

- Think about why it is desirable to stay private. It is important that people think about what data they have, what data they want to protect, how likely it is that that data could get into the wrong hands and how serious that would be if it happened.

- Protect passwords. Change them often and do not use the same password for all accounts.

- And stop playing with global positioning systems (GPS) and other devices that let the entire world know where you are and with whom.

- And many more.

So, Don’t hesitate to subscribe to our Online CISA Lecture towards taking your CISA exam. For more details, call/whataspp: 07019402526
Educational Services / Re: Be A CISA In 2017!!! by J123: 2:35pm On Jan 03, 2017
The following are exam dates schedule for CISA in 2017. Don't hesitate to join the IS Auditors & Cyber gurus.

Exam Window 1: 1 May–30 June 2017

Registration opens: 15 November, 2016

Registration deadline: 23 June 2017

Scheduling open: 15 February 2017 *

Deferrals deadline: 30 June 2017


Exam Window 2: 1 August–30 September

Registration opens: 1 May, 2017

Registration deadline: 22 September 2017

Scheduling open: 1 May 2017

Deferrals deadline: 30 September 2017


Exam Window 3: 1 November–31 December

Registration opens: 1 August, 2017

Registration deadline: 20 December 2017

Scheduling open: 1 August 2017

Deferrals deadline: 31 December 2017


* Candidates who register and pay for the exam on or prior to 14 February 2017 will not be able to schedule their appointment for the testing window until after this date.

Candidates will receive notification via email when scheduling is available.


IN VIEW OF THE ABOVE, REGISTER FOR YOUR CISA LECTURE TODAY. For details call/whatsapp 07019402526

"Make Hay While The Sun Shines".
Educational Services / Be A CISA In 2017!!! by J123: 12:11pm On Dec 16, 2016
Do you know that IT Auditing and Cyber Security is an extremely hot career choice that mixes aspects of MIS, Finance, Risk, and Accounting? Take charge with specialized expertise that stands out from the crowd. Gain the knowledge and skills needed to complete your ISACA Certification – CISA (Certified Information System Auditors).

ISACA® is a globally accepted certifications. You’ll be on your way to obtaining the certification that affirms you as one of the world’s most-qualified information systems audit and control professionals.

Contemplating about how to write 2017 CISA Diet Exams?! Worry Less!

Don't hesitate to join our online CISA lecture for quality lecture contents with 80% success rate. Testimonials of our students are there to back up our claims.
So subscribe to our online CISA lecture today to learn more about CISA & enjoy the following:
* Free registration for our students.
* Maximum use of the audio function in WhatsApp, enabling you to listen to the lectures over and over again.
* Detailed review of over 200 CISA questions.
* Multitudes of case studies to drive home the points.
* Access to study materials to aid your learning.
*Great opportunity for candidates without access to tuition providers.
*Great opportunity for executives with busy schedules.
*ISACA Q&A Database for timing practicing & precision including exam mode also available.

Stand out from the competition with the breadth of knowledge and dedicated skills of ISACA Certification in IT Auditing and Cyber Security—and secure a successful future!!!

For details, call/whatsapp: 07019402526
Educational Services / Re: CISA Lecture On The Move!!! by J123: 12:46pm On Jul 26, 2016
CISA Lecture Without Boarder!

Recovery Time Objectives (RTO) is the time period after disaster in which normal business functionality needs to be restored while Recovery Point Objective (RPO) is the point to which data must be restored after a disaster so as to resume processing transactions.

In view of this, the following recovery strategies can be adopted based on the Business Impact Analysis (BIA) perfomed:

1. Redundant Site

2. Hot Site

3. Warm Site

4. Cold Site

In addition, backups should be performed in a way that the latest backup is no older than the maximum time frame.

But it had been observed that most of our businesses do not have a proper Disaster Recovery Plan or Business Continuity Plan to support their businesses following a major disaster. How can this be corrected?!

Learnt this & more in our online CISA lecture starting this weekend. More people are joining daily.

No location or geographical barrier!

Don't be left out!!!

For details, Contact WhatsApp:07019402526/BBM:5BFE5956
Educational Services / Re: CISA Lecture On The Move!!! by J123: 12:54pm On Jul 25, 2016
CISA Case Study......Be secured!

What is the difference between http and https?

Don't know how many of you are aware of this difference, but it is worth sending to anyone that do not...

The main difference between http:// and https:// is, It's all about keeping you secured.

** HTTP stands for Hyper Text Transfer Protocol

The *S*(big surprise) stands for *"Secure"..*
If you visit a website or web page, and look at the address in the web browser, it will likely begin with the following: http://. This means that the website is talking to your browser using the regular 'unsecured' language.

In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the website.
If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever ever enter your credit card number in an http website! But if the web address begins with https://, that basically means your computer is talking to the website in a secure code that no one can eavesdrop on.

You understand why this is so important,
right?

If a website ever asks you to enter your credit card information, you should automatically look to see if the web address begins with https://

If it doesn't. You should *NEVER* enter sensitive information...such as a *credit card number*

*****************************************

This is tip of the iceberg among other things that you will learn in our online CISA lecture. Don't hesitate to join us now. Lecture starts by next weekend. It's gonna be very educative & eye opener!!!

No location nor geographical barrier!

Your gateway to pass CISA certification in a fashionable way!

For details, contact:

WhatsApp: 07019402526
BBM: 5BFE5956
Educational Services / CISA Lecture On The Move!!! by J123: 12:53pm On Jul 25, 2016
Do you know that you can receive CISA lecture without any hassle of rushing down to lecture centre?!

Are you procrastinating to have a go on the CISA exam due to work or office pressure?!

Here comes a relief at last. An Initiative designed to help you actualize your dream irrespective of work pressure or location barrier. It's a very dynamic & educative.

The Certified Information Systems Auditor(CISA) Online Training for December diet starts, next weekend, on July 30, 2016.

Modus Operandi:

We use the WhatsApp app to deliver the training using the audio feature and Facebook to analyse hundreds of CISA questions. This offer you the opportunity to get all what you want to on the move,Anytime,Anywhere!

Features include:

-Ttraining by a facilitator that scored 604 and is an examiner of CISA.

-Opportunity to listen to the audio lectures over and over.

-Opportunity to attend online class for locations without CISA training centres.

-Opportunity to meet CISA candidates all over the world for career networking.

-Review of multiple case studies with experienced hands to explain concepts.

-Job opportunities will be shared in addition to online study groups.

-Modern day practical examples.

-Bonus: Free certified ethical hacker study materials.

Fee:N70, 000, $500 (outside Nigeria)

DISCOVER HOW AN ISACA® MEMBERSHIP CAN HELP YOU ADVANCE YOUR CAREER. YOU HAVE THE TALENT. WE MAKE YOU AN ASSET!!!

For More details, contact:

Whatsapp:07019402526

BBM: 5BFE5956
Career / Re: Free Materials For CISSP, CISA, CISM, GIAC, BCP, DRP, and CBCP Exams? by J123: 12:32pm On Jul 25, 2016
Do you know that you can receive CISA lecture without any hassle of rushing down to lecture centre?!

Are you procrastinating to have a go on the CISA exam due to work or office pressure?!

Here comes a relief at last. An Initiative designed to help you actualize your dream irrespective of work pressure or location barrier. It's a very dynamic & educative.

The Certified Information Systems Auditor(CISA) Online Training for December diet starts, next weekend, on July 30, 2016.

Modus Operandi:

We use the WhatsApp app to deliver the training using the audio feature and Facebook to analyse hundreds of CISA questions. This offer you the opportunity to get all what you want to on the move,Anytime,Anywhere!

Features include:

-Ttraining by a facilitator that scored 604 and is an examiner of CISA.

-Opportunity to listen to the audio lectures over and over.

-Opportunity to attend online class for locations without CISA training centres.

-Opportunity to meet CISA candidates all over the world for career networking.

-Review of multiple case studies with experienced hands to explain concepts.

-Job opportunities will be shared in addition to online study groups.

-Modern day practical examples.

-Bonus: Free certified ethical hacker study materials.

Fee:N70, 000, $500 (outside Nigeria)

DISCOVER HOW AN ISACA® MEMBERSHIP CAN HELP YOU ADVANCE YOUR CAREER. YOU HAVE THE TALENT. WE MAKE YOU AN ASSET!!!

For More details, contact:

Whatsapp:07019402526

BBM: 5BFE5956

(1) (2) (of 2 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 60
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.