Certified in Risk and Information Systems Control (CRISC) Certification Training - Simplilearn | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

Certified in Risk and Information Systems Control (CRISC) Certification Training - Simplilearn

  • On Demand Class Icon
    On Demand
    • HRDF SBL Claimable
    • Certificate of Attendance available
    • 180 days of access from date of purchase
    Starting From
    RM 2231.70
    20 Hours
  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    0 Days

Course Details

Expand All
CRISC training from Simplilearn, aligned to ISACA 2015, ensures you ace the exam in the first attempt. The training is designed to excel you in tasks such as managing the IT risks, design, implementation, monitoring and maintenance of IS controls.

CRISC certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for:

• CEOs/CFOs

• Chief Audit Executives

• Audit Partners/Heads

• CIOs/CISOs

• Chief Compliance/Privacy/Risk Officers

• Security Managers/Directors/Consultants

• IT Directors/Managers/Consultants

• Audit Directors/Managers/Consultant


By the end of this training you will:

• Demonstrate efficiency in designing, implementing, monitoring and maintaining the IS controls of the enterprise

• Acquire the relevant knowledge and skills required to clear the CRISC certification exam

• Earn the requisite 20 CPEs required to take up the CRISC certification exam

• Develop a working knowledge of the 4 domains areas as prescribed by ISACA –Exam Candidate Information Guide 2015.


Modules

Expand All

• Introduction to CRISC®

• Objectives
• CRISC®
• About ISACA
• About ISACA® (contd.)
• CRISC® Domains
• Value of CRISC®
• Requirements for CRISC® certification
• CRISC® Exam
• Quiz
• Summary
• Conclusion

• Risk Identification

• Objectives

• Task Statements

• Knowledge Check

• Knowledge Statements

• IT Risk Concepts

• Information Security Risk Concepts

• Information Security Risk Concepts (contd)

• Information Security Risk Concepts: Confidentiality

• Information Security Risk Concepts: Integrity

• Information Security Risk Concepts: Availability

• Information Security Risk Concepts: Segregation of Duties

• Information Security Risk Concepts: Authentication

• Information Security Risk Concepts: IAAA

• Knowledge Check

• Information Security Risk Concepts: Identity Management

• Information Security Risk Concepts: Identity Management

• Knowledge Check

• Risk Management Standards and Frameworks

• COBIT 5 for Risk

• ISO/IEC 27001 Series

• ISO/IEC: 27005

• Risk Identification Frameworks

• Threats and Vulnerabilities Related to Assets

• Risk Factors

• Risk Factors (contd.)

• Elements of Risk

• Assets

• Assets (contd.)

• Threats

• Threats (contd.)

• Vulnerabilities

• Vulnerabilities (contd.)

• Vulnerabilities Assessment

• Penetration Testing

• Penetration Testing (contd.)

• Knowledge Check

• Developing Risk Scenarios

• Benefits of Using Risk Scenarios

• Risk Scenario Development Tools and Techniques

• Risk Scenario Development Tools and Techniques (contd.)

• Risk Scenario Development Tools and Techniques (contd.)

• Knowledge Check

• Risk Communication, Awareness, and Culture

• The Risk Awareness Program

• The Risk Awareness Program (contd.)

• Risk Management Strategy

• Organizational Structures and Impact on Risk

• Organization Structures and Impact on Risk: RACI Model

• Organizational Culture, Ethics and Behavior, and the Impact on Risk

• Organizational Culture, Ethics and Behavior, and the Impact on Risk (contd.)

• Knowledge Check

• Compliance With Laws, Regulations, Standards, and Compliance Requirements

• Establishing an Enterprise Risk Management Approach

• Risk Register

• Risk Register (contd.)

• Knowledge Check

• Principles of Risk and Control Ownership

• Principles of Risk and Control Ownership (contd.)

• Risk Appetite and Tolerance

• Risk Acceptance

• Risk Acceptance (contd.)

• Quiz

• Summary

• Summary (contd.)

• Conclusion


• Risk Assessment

• Objectives

• Task Statements

• Knowledge Statements

• Knowledge check

• Risk Assessment Techniques

• Risk Assessment Techniques (contd.)

• Risk Assessment Techniques (contd.)

• Risk Scenarios Analysis

• Risk Scenarios Analysis: Organizational Structure and Culture

• Risk Scenarios Analysis: Policies

• Risk Scenarios Analysis: Policies (contd.)

• Risk Scenarios Analysis: Standards and Procedures

• Knowledge check

• Risk Scenarios Analysis: Technology

• Risk Scenarios Analysis: Architecture

• Risk Scenarios Analysis Controls

• Risk Scenarios Analysis Controls (contd.)

• Risk Analysis Methodologies

• Risk Analysis Methodologies: Quantitative Risk Assessment

• Risk Analysis Methodologies: Qualitative Risk Assessment

• Knowledge check

• Risk Analysis Methodologies: Semi-quantitative Risk Assessment

• Risk Analysis Methodologies: Semi-quantitative Risk Assessment(contd)

• Risk Ranking

• OCTAVE®

• Knowledge check

• Control Assessment: Current State of Controls

• Control Assessment: Current State of Controls (contd.)

• Control Assessment: Current State of Controls (contd.)

• Control Assessment: Logs

• Control Assessment: Logs (contd.)

• Current State of Controls: Vulnerability Assessments and Penetration Testing

• Control Assessment: Vulnerability Assessments and Penetration Testing

• Knowledge check

• Risk Evaluation and Impact Assessment: Risk and Control Analysis

• Risk and Control Analysis: Data Analysis

• Risk and Control Analysis: Data Analysis

• Risk and Control Analysis: Threat and Misuse Case Modelling

• Risk and Control Analysis: Root Cause Analysis

• Risk and Control Analysis: Gap Analysis

• Risk and Control Analysis: Gap Analysis (contd.)

• Third-Party Management

• Third-Party Management: Outsourcing

• Cloud

• Knowledge check

• Third-Party Management: Contractual Requirements

• IT Operations Management

• IT Operations Management (contd)

• System Development Lifecycle

• System Development Lifecycle (contd.)

• System Development Lifecycle (contd.)

• Emerging Technologies

• Emerging Technologies (contd.)

• Knowledge check

• Enterprise Architecture

• Enterprise Architecture: Hardware

• Enterprise Architecture: Hardware (contd.)

• Enterprise Architecture: Hardware (contd.)

• Enterprise Architecture: Software

• Enterprise Architecture: Software (contd)

• Knowledge check

• Enterprise Architecture: Applications

• Enterprise Architecture: Applications (contd.)

• Enterprise Architecture: Utilities

• Enterprise Architecture: Software Utilities

• Knowledge check

• Enterprise Architecture: Platforms

• Enterprise Architecture: Network Components

• Enterprise Architecture: Network Components (contd.)

• Enterprise Architecture: Network Components

• Enterprise Architecture: Network Components (contd.)

• Enterprise Architecture: Network Components – Cabling

• Enterprise Architecture: Network Components - Cabling

• Knowledge check

• Enterprise Architecture: Network Components-Repeaters

• Enterprise Architecture: Network Components – Switches

• Enterprise Architecture Network: Components - Switches (contd.)

• Enterprise Architecture: Network Components – Routers

• Enterprise Architecture: Network Components - Routers (contd.)

• Enterprise Architecture: Network Components - Routers (contd.)

• Enterprise Architecture: Network Components-Firewalls

• Knowledge check

• Enterprise Architecture: Network Components-Firewalls

• Enterprise Architecture: Network Components-Proxy

• Enterprise Architecture: Network Components-Domain Name System

• Enterprise Architecture: Network Components-Wireless Access Points

• Enterprise Architecture: Network Components-Other Network

• Enterprise Architecture: Network Architecture

• Enterprise Architecture: Network Architecture

• Enterprise Architecture: Network Architecture (contd.)

• Knowledge check

• Quiz

• Summary

• Summary (contd.)

• Conclusion


• Risk Response

• Objectives

• Task Statements

• Knowledge Statements

• Knowledge check

• Overview

• Risk Response Options

• Response Risk Options: Risk Acceptance

• Risk Response Options: Risk Acceptance (contd.)

• Risk Response Options: Risk Mitigation

• Risk Response Options: Risk Avoidance

• Risk Response Options: Risk Avoidance (contd.)

• Risk Response Options: Risk Sharing

• Knowledge Check

• Response Analysis

• Response Analysis (contd.)

• Response Response Options: Risk Acceptance

• Response Analysis: Return on Investment

• Response Analysis: Return on Investment (contd.)

• Risk Response: Plans Developing a Risk Response Plan

• Risk Response: Plans Developing a Risk Response Plan (contd.)

• Risk Response: Plans Developing a Risk Response Plan (contd.)

• Knowledge Check

• Risk Response: Plans Developing a Risk Response Plan (contd.)

• Risk Response: Plans Developing a Risk Response Plan (contd.)

• Control Objectives and Practices

• Control Objectives and Practices: Business Processes

• Control Objectives and Practices: Information Security

• Control Objectives and Practices: Information Security (contd.)

• Knowledge Check

• Control Objectives and Practices: Third-party Management

• Control Objectives and Practices: Third-party Management (contd.)

• Control Objectives and Practices: Data Management

• Control Objectives and Practices: Data Management (contd.)

• Control Objectives and Practices: Data Management-Cryptography

• Knowledge Check

• Control Objectives and Practices: Information Systems Architecture

• Control Objectives and Practices: Information Systems Architecture (contd.)

• Knowledge Check

• Control Objectives and Practices: Information Systems Architecture (contd.)

• Control Objectives and Practices: Information Systems Architecture (contd.)

• Knowledge Check

• Control Ownership

• Systems Control Design Implementation

• SystemsControl Design Implementation: Unit Testing

• Systems Control Design Implementation: System Testing

• Systems Control Design Implementation: System Testing (contd.)

• Systems Control Design Implementation: System Testing (contd.)

• Knowledge Check

• Systems Control Design Implementation: Quality Assurance

• Systems Control Design Implementation: Quality Assurance (contd.)

• Systems Control Design Implementation: Others

• Systems Control Design Implementation: Go-live Techniques

• Systems Control Design Implementation: Post-implementation Review

• Systems Control Design Implementation: Project Closeout

• Knowledge Check

• Controls and Countermeasures

• Controls and Countermeasures: Control Matrix

• Controls and Countermeasures: Control Standards and Frameworks

• Controls and Countermeasures: Categories of Controls Interact

• Knowledge Check

• Business Continuity and Disaster Recovery Management

• Business Continuity and Disaster Recovery Management (contd.)

• Business Continuity and Disaster Recovery Management (contd.)

• Business Continuity and Disaster Recovery Management (contd.)

• Knowledge Check

• Exception Management

• Risk Ownership and Accountability

• Inherent and Residual Risk

• Inherent and Residual Risk (contd.)

• Inherent and Residual Risk (contd.)

• Quiz

• Summary

• Summary (contd.)

• Conclusion


• Risk and Control Monitoring and Reporting

• Objectives

• Task Statements

• Knowledge Statements

• Knowledge check

• Key Risk Indicators (KRIs)

• KRIs Selection

• Benefits of KRIs

• KRIs Effectiveness

• KRIs Optimization

• Knowledge Check

• KRIs Maintenance

• Data Collection

• Data Collection (contd.)

• Knowledge Check

• Monitoring Controls

• Monitoring Controls (contd.)

• Monitoring Controls (contd.)

• Control Assessment

• Knowledge Check

• Vulnerability Assessments

• Penetration Testing

• Third-party Assurance

• Results of Control Assessments

• Maturity Model Assessment and Improvement Techniques

• Capability Maturity Model

• Knowledge Check

• IT Risk Profile

• Quiz

• Summary

• Conclusion

• Thank you


Trainers

See All
Reset

Reviews

0
based on 0 ratings reviews