Sale!

CRISC: Certified in Risk and Information Systems Control Course

Original price was: $50.00.Current price is: $15.00.

Price: 15.00 USD | Size: 5.07 GB |   Duration : 16.28 Hours |67 Video Lessons |

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Description

Price: 15.00 USD | Size: 5.07 GB |   Duration : 16.28 Hours |67 Video Lessons |

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

 

Key benefits

  • Navigate IT risk concepts
  • Learn risk roles and RACI
  • Strategize risk control implementation

Description

“CRISC Certification Training Course” .The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures.

What you will learn

Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools

Table of Contents

4 Chapters

Governance and Risk Management Concepts
Course Overview
IT Risk Management Context
Key Concepts of Risk
The Importance and Value of IT Risk Management and Business Strategy
The RACI Chart
Key Roles Regarding Risk
Organizational Structure and Culture
The Impact on Risk Management of Culture and Behavior
Risk Culture
The Value of Risk Communication
What are Policies, Standards, and Procedures?
Reviewing the Business Process
Risk Management Principles, Processes and Controls
IT Risk and its Relation to Other Business Functions
Project Risk and Change Risk
People and Technology
Data and Intellectual Property
IT Risk Management and Good Practices
Three Lines of Defense
What is a Risk Profile?
Risk Appetite, Tolerance and Capacity
Legal, Contractual, and Regulatory Requirements
IT Risk Assessment Practices
Identifying Risk Events
Identifying Risk Factors
Changes in the Risk Environment
Threat Modeling and Threat Landscape
How to Perform Threat Modeling and Abuse-Case Modeling
Sources of Vulnerabilities
Vulnerability Assessment and Penetration Testing
Risk Scenario Development
Risk Assessment Standards and Frameworks
Tools of Risk Assessment
Risk Analysis Methodologies
Business Impact Analysis
Inherent, Residual and Current Risk
Risk Response and Reporting Effectively
Mitigation, Transference, and Avoidance as Risk Responses
Risk Acceptance as a Response
Who Owns and Controls Risk?
Involving Third-party Risk Management
Issue Finding and Exceptions
Managing Emergent Risk
Types, Standards and Frameworks
Control Design, Selection and Analysis
Implementing Controls
Testing the Effectiveness of Controls
Risk Response Plans
Collecting, Aggregating, Analyzing, and Validating Data
Monitoring Techniques for Risk and Controls
Reporting Techniques for Risk and Control
Using Key Performance Indicators (KPIs)
Using Key Risk Indicators (KRIs)
Using Key Control Indicators (KCIs)
Information Technology and Security Principles
The Scope of Enterprise Architecture
Hardware and Software
Networking Fundamentals
Virtualization and Cloud
Project Management
Disaster Recovery and Business Continuity
Risk in the Data Life Cycle
Risk in the System Development Life Cycle
Emerging Technologies
Information Security Concepts
The CIA Triad
Access Control
What is Encryption?
Information Security Awareness and Training
Data Privacy Fundamentals

Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

You may also like…