preloder

Certified in Risk and Information Systems Control – CRISC

The course enables you to design, implement, monitor, and maintain IS controls for enterprises. It covers topics such as risk identification, assessment, response, and control monitoring. It also includes the four most important domains prescribed by ISACA and awards the requisite 20 CPEs required for CRISC certification examination. Real-life projects and simulation exams help you prepare for the CRISC Certification exam.

CRISC training from Simplilearn, aligned to ISACA 2015, ensures you ace the exam in the first attempt. The training is designed to excel you in tasks such as managing the IT risks, design, implementation, monitoring and maintenance of IS controls.

Objectives

  • Demonstrate efficiency in designing, implementing, monitoring and maintaining the IS controls of the enterprise
  • Acquire the relevant knowledge and skills required to clear the CRISC certification exam
  • Earn the requisite 20 CPEs required to take up the CRISC certification exam
  • Develop a working knowledge of the 4 domains areas as prescribed by ISACA –Exam Candidate Information Guide 2015.

Who should take this course?

CRISC certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:

  • CEOs/CFOs
  • Chief Audit Executives
  • Audit Partners/Heads
  • CIOs/CISOs
  • Chief Compliance/Privacy/Risk Officers
  • Security Managers/Directors/Consultants
  • IT Directors/Managers/Consultants
  • Audit Directors/Managers/Consultant

Risk Identification

1
Objectives
2
Task Statements
3
Knowledge Statements
4
IT Risk Concepts
5
Information Security Risk Concepts
6
Information Security Risk Concepts: Confidentiality
7
Information Security Risk Concepts: Integrity
8
Information Security Risk Concepts: Availability
9
Information Security Risk Concepts: AvailabilityInformation Security Risk Concepts: Segregation of Duties
10
Information Security Risk Concepts: Authentication
11
Information Security Risk Concepts: IAAA
12
Information Security Risk Concepts: Identity Management
13
Risk Management Standards and Frameworks
14
COBIT 5 for Risk
15
ISO/IEC 27001 Series
16
ISO/IEC: 27005
17
Risk Identification Frameworks
18
Threats and Vulnerabilities Related to Assets
19
Threats
20
Vulnerabilities
21
Penetration Testing
22
Developing Risk Scenarios
23
Benefits of Using Risk Scenarios
24
Risk Scenario Development Tools and Techniques

Risk Assessment

1
Objectives
2
Risk Assessment Techniques
3
Risk Scenarios Analysis
4
Risk Analysis Methodologies
5
Risk Ranking
6
OCTAVE®
7
Control Assessment: Current State of Controls
8
Control Assessment: Logs
9
Current State of Controls: Vulnerability Assessments and Penetration Testing
10
Control Assessment: Vulnerability Assessments and Penetration Testing
11
Risk Evaluation and Impact Assessment: Risk and Control Analysis
12
Risk and Control Analysis: Data Analysis
13
Third-Party Management
14
Cloud
15
Third-Party Management: Contractual Requirements
16
IT Operations Management
17
System Development Lifecycle
18
Emerging Technologies
19
Enterprise Architecture

Risk Response

1
Risk Response Options
2
Response Analysis
3
Response Response Options: Risk Acceptance
4
Risk Response: Plans Developing a Risk Response Plan
5
Control Objectives and Practices: Third-party Management
6
Control Objectives and Practices: Data Management
7
Control Ownership
8
Controls and Countermeasures
9
Business Continuity and Disaster Recovery Management
10
Management
11
Risk Ownership and Accountability
12
Inherent and Residual Risk

Risk and Control Monitoring and Reporting

1
Objectives
2
Key Risk Indicators (KRIs)
3
KRIs Effectiveness
4
KRIs Optimization
5
KRIs Maintenance
6
Data Collection
7
Monitoring Controls
8
Control Assessment
9
Vulnerability Assessments
10
Penetration Testing
11
Third-party Assuranc
12
Results of Control Assessments
13
Maturity Model Assessment and Improvement Techniques
14
Capability Maturity Model
15
IT Risk Profile
No announcements at this moment.

Be the first to add a review.

Please, login to leave a review
This website uses cookies and asks your personal data to enhance your browsing experience.