ISACA CRISC – Certified in Risk and Information Systems Control Course & PDF Guides
$10.00
Price: 10.00 USD | Size: 4.83 GB | Duration : 11+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND : Expert TRAINING | ENGLISH | Bonus : ISACA CRISC PDF Guides | INSTANT DOWNLOAD
Description
Price: 10.00 USD | Size: 4.83 GB | Duration : 11+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND : Expert TRAINING | ENGLISH | Bonus : ISACA CRISC PDF Guides | INSTANT DOWNLOAD
ISACA CRISC – Certified in Risk and Information Systems Control Course & PDF Guides
ISACA CRISC – Certified in Risk and Information Systems Control
0 Module 1_ Welcome and Intro — 0 1.1 Welcome and Introduction
0 Module 1_ Welcome and Intro — 1 1.2 Who is ISACA_
0 Module 1_ Welcome and Intro — 2 1.3 Who Should Take the CRISC_
0 Module 1_ Welcome and Intro — 3 1.4 The Exam
1 Module 2_ Preliminary — 0 2.1 Introduction to Information Security Risks
1 Module 2_ Preliminary — 1 2.2 Risk Governance vs. Risk Management
1 Module 2_ Preliminary — 2 2.3 Risk Definitions
1 Module 2_ Preliminary — 3 2.4 IT Risk Management
1 Module 2_ Preliminary — 4 2.5 IT Security Basics
1 Module 2_ Preliminary — 5 2.6 Risk Management for IT Projects
1 Module 2_ Preliminary — 6 2.7 ISACA_s Framework and Lifecycle
1 Module 2_ Preliminary — 7 2.8 Review Questions
2 Module 3_ Risk Identification — 0 3.1 Risk Identification Intro
2 Module 3_ Risk Identification — 1 3.2 ISO 27005 Framework
2 Module 3_ Risk Identification — 10 3.11 Risk Culture
2 Module 3_ Risk Identification — 11 3.12 Roles and Responsibilities
2 Module 3_ Risk Identification — 12 3.13 The Risk Register
2 Module 3_ Risk Identification — 13 3.14 Risk Scenarios
2 Module 3_ Risk Identification — 14 3.15 Hardware and Software Risks
2 Module 3_ Risk Identification — 15 3.16 Network Risks
2 Module 3_ Risk Identification — 16 3.17 Emerging Risks
2 Module 3_ Risk Identification — 17 3.18 Third Party Risks
2 Module 3_ Risk Identification — 2 3.3 NIST 800-39 Risk Framing
2 Module 3_ Risk Identification — 3 3.4 NIST 800-39 Risk Assessment
2 Module 3_ Risk Identification — 4 3.5 NIST 800-39 Risk Response
2 Module 3_ Risk Identification — 5 3.6 NIST 800-39 Risk Monitoring
2 Module 3_ Risk Identification — 6 3.7 NIST 800-30 Intro
2 Module 3_ Risk Identification — 7 3.8 NIST 800-30 Risk Assessment Methodology
2 Module 3_ Risk Identification — 8 3.9 NIST 800-37 Revision 1 and Revision 2
2 Module 3_ Risk Identification — 9 3.10 Alignment with the Business
3 Module 4_ Risk Assessment — 0 4.1 Risk Assessment Intro
3 Module 4_ Risk Assessment — 1 4.2 Tools and Techniques Part 1
3 Module 4_ Risk Assessment — 2 4.3 Tools and Techniques Part 2
3 Module 4_ Risk Assessment — 3 4.4 Business Impact Analysis
3 Module 4_ Risk Assessment — 4 4.5 Controls Assessment
3 Module 4_ Risk Assessment — 5 4.6 Stride Threat Modeling
3 Module 4_ Risk Assessment — 6 4.7 Gap Analysis
3 Module 4_ Risk Assessment — 7 4.8 Risk Analysis Methodologies
3 Module 4_ Risk Assessment — 8 4.9 Risk Assessment Report
4 Module 5_ Risk Mitigation — 0 5.1 Risk Mitigation Reduction
4 Module 5_ Risk Mitigation — 1 5.2 Risk Mitigation Transference and Acceptance
4 Module 5_ Risk Mitigation — 10 5.11 Protecting the Network – Segmentation
4 Module 5_ Risk Mitigation — 11 5.12 Protecting the Network – Wireless Security
4 Module 5_ Risk Mitigation — 12 5.13 Protecting the Network – Services
4 Module 5_ Risk Mitigation — 13 5.14 Protecting the Network Through Detection and Network Access Control
4 Module 5_ Risk Mitigation — 14 5.15 Data and Endpoint Security
4 Module 5_ Risk Mitigation — 15 5.16 Selecting a Mitigation Strategy
4 Module 5_ Risk Mitigation — 16 5.17 Types of Mitigating Controls
4 Module 5_ Risk Mitigation — 17 5.18 Identity and Access Management
4 Module 5_ Risk Mitigation — 18 5.19 Third Party Governance
4 Module 5_ Risk Mitigation — 19 5.20 Policies, Procedures, Standards, and Guidelines
4 Module 5_ Risk Mitigation — 2 5.3 Information Security Concepts
4 Module 5_ Risk Mitigation — 20 5.21 Certification and Accreditation
4 Module 5_ Risk Mitigation — 3 5.4 Security Program Requirements
4 Module 5_ Risk Mitigation — 4 5.5 Essential Elements of an Information Security Program
4 Module 5_ Risk Mitigation — 5 5.6 Introduction to Information Security Frameworks – ISO 27002
4 Module 5_ Risk Mitigation — 6 5.7 Information Security Frameworks
4 Module 5_ Risk Mitigation — 7 5.8 Information Security Architecture
4 Module 5_ Risk Mitigation — 8 5.9 Security Operations Event Monitoring
4 Module 5_ Risk Mitigation — 9 5.10 Secure Engineering and Threat Modeling
5 Module 6_ Risk Monitoring and Control — 0 6.1 Risk, Control Monitoring, and Reporting
5 Module 6_ Risk Monitoring and Control — 1 6.2 Key Risk Indicators (KRIs)
5 Module 6_ Risk Monitoring and Control — 2 6.3 Tools for Risk Monitoring
CRISC – Certified in Risk and Information Systems Control
CRISC Module 1 Part 1 – Introduction
CRISC Module 1 Part 2 – Introduction
CRISC Module 2 Part 1 – Risk Identification
CRISC Module 2 Part 2 – Risk Identification
CRISC Module 2 Part 3 – Risk Identification
CRISC Module 2 Part 4 – Risk Identification
CRISC Module 3 Part 1 – Risk Assessment
CRISC Module 3 Part 2 – Risk Assessment
CRISC Module 3 Part 3 – Risk Assessment
CRISC Module 4 Part 01 – Risk Response
CRISC Module 4 Part 02 – Risk Response
CRISC Module 4 Part 03 – Risk Response
CRISC Module 4 Part 04 – Risk Response
CRISC Module 4 Part 05 – Risk Response
CRISC Module 4 Part 06 – Risk Response
CRISC Module 4 Part 07 – Risk Response
CRISC Module 4 Part 08 – Risk Response
CRISC Module 4 Part 09 – Risk Response
CRISC Module 4 Part 10 – Risk Response
CRISC Module 4 Part 11 – Risk Response
CRISC Module 4 Part 12 – Risk Response
CRISC Module 4 Part 13 – Risk Response
CRISC Module 4 Part 14 – Risk Response
CRISC Module 4 Part 15 – Risk Response
CRISC Module 4 Part 16 – Risk Response
CRISC Module 4 Part 17 – Risk Response
CRISC Module 5 Part 1 – Risk Monitoring & Reporting
CRISC Module 5 Part 2 – Risk Monitoring & Reporting
CRISC Module 5 Part 3 – Risk Monitoring & Reporting
CRISC Module 5 Part 4 – Risk Monitoring & Reporting
CRISC-Review-Manual-6th-Edition.pdf
ISACA-CRISC-Questions-and-Answers.pdf
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.