Welcome to Expert Training The Online Course Shop!
-60%

ISACA CRISC – Certified in Risk and Information Systems Control Course & PDF Guides

$10.00

Price: 10.00 USD | Size: 4.83 GB | Duration : 11+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND : Expert TRAINING | ENGLISH | Bonus : ISACA CRISC PDF Guides | INSTANT DOWNLOAD

SKU: SC-CRS-CRT-IN Category:

OR

Add to Wishlist
Add to Wishlist

Description

Price: 10.00 USD | Size: 4.83 GB | Duration : 11+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND : Expert TRAINING | ENGLISH | Bonus : ISACA CRISC PDF Guides | INSTANT DOWNLOAD

ISACA CRISC – Certified in Risk and Information Systems Control Course & PDF Guides

ISACA CRISC – Certified in Risk and Information Systems Control

 

0 Module 1_ Welcome and Intro — 0 1.1 Welcome and Introduction

0 Module 1_ Welcome and Intro — 1 1.2 Who is ISACA_

0 Module 1_ Welcome and Intro — 2 1.3 Who Should Take the CRISC_

0 Module 1_ Welcome and Intro — 3 1.4 The Exam

1 Module 2_ Preliminary — 0 2.1 Introduction to Information Security Risks

1 Module 2_ Preliminary — 1 2.2 Risk Governance vs. Risk Management

1 Module 2_ Preliminary — 2 2.3 Risk Definitions

1 Module 2_ Preliminary — 3 2.4 IT Risk Management

1 Module 2_ Preliminary — 4 2.5 IT Security Basics

1 Module 2_ Preliminary — 5 2.6 Risk Management for IT Projects

1 Module 2_ Preliminary — 6 2.7 ISACA_s Framework and Lifecycle

1 Module 2_ Preliminary — 7 2.8 Review Questions

2 Module 3_ Risk Identification — 0 3.1 Risk Identification Intro

2 Module 3_ Risk Identification — 1 3.2 ISO 27005 Framework

2 Module 3_ Risk Identification — 10 3.11 Risk Culture

2 Module 3_ Risk Identification — 11 3.12 Roles and Responsibilities

2 Module 3_ Risk Identification — 12 3.13 The Risk Register

2 Module 3_ Risk Identification — 13 3.14 Risk Scenarios

2 Module 3_ Risk Identification — 14 3.15 Hardware and Software Risks

2 Module 3_ Risk Identification — 15 3.16 Network Risks

2 Module 3_ Risk Identification — 16 3.17 Emerging Risks

2 Module 3_ Risk Identification — 17 3.18 Third Party Risks

2 Module 3_ Risk Identification — 2 3.3 NIST 800-39 Risk Framing

2 Module 3_ Risk Identification — 3 3.4 NIST 800-39 Risk Assessment

2 Module 3_ Risk Identification — 4 3.5 NIST 800-39 Risk Response

2 Module 3_ Risk Identification — 5 3.6 NIST 800-39 Risk Monitoring

2 Module 3_ Risk Identification — 6 3.7 NIST 800-30 Intro

2 Module 3_ Risk Identification — 7 3.8 NIST 800-30 Risk Assessment Methodology

2 Module 3_ Risk Identification — 8 3.9 NIST 800-37 Revision 1 and Revision 2

2 Module 3_ Risk Identification — 9 3.10 Alignment with the Business

3 Module 4_ Risk Assessment — 0 4.1 Risk Assessment Intro

3 Module 4_ Risk Assessment — 1 4.2 Tools and Techniques Part 1

3 Module 4_ Risk Assessment — 2 4.3 Tools and Techniques Part 2

3 Module 4_ Risk Assessment — 3 4.4 Business Impact Analysis

3 Module 4_ Risk Assessment — 4 4.5 Controls Assessment

3 Module 4_ Risk Assessment — 5 4.6 Stride Threat Modeling

3 Module 4_ Risk Assessment — 6 4.7 Gap Analysis

3 Module 4_ Risk Assessment — 7 4.8 Risk Analysis Methodologies

3 Module 4_ Risk Assessment — 8 4.9 Risk Assessment Report

4 Module 5_ Risk Mitigation — 0 5.1 Risk Mitigation Reduction

4 Module 5_ Risk Mitigation — 1 5.2 Risk Mitigation Transference and Acceptance

4 Module 5_ Risk Mitigation — 10 5.11 Protecting the Network – Segmentation

4 Module 5_ Risk Mitigation — 11 5.12 Protecting the Network – Wireless Security

4 Module 5_ Risk Mitigation — 12 5.13 Protecting the Network – Services

4 Module 5_ Risk Mitigation — 13 5.14 Protecting the Network Through Detection and Network Access Control

4 Module 5_ Risk Mitigation — 14 5.15 Data and Endpoint Security

4 Module 5_ Risk Mitigation — 15 5.16 Selecting a Mitigation Strategy

4 Module 5_ Risk Mitigation — 16 5.17 Types of Mitigating Controls

4 Module 5_ Risk Mitigation — 17 5.18 Identity and Access Management

4 Module 5_ Risk Mitigation — 18 5.19 Third Party Governance

4 Module 5_ Risk Mitigation — 19 5.20 Policies, Procedures, Standards, and Guidelines

4 Module 5_ Risk Mitigation — 2 5.3 Information Security Concepts

4 Module 5_ Risk Mitigation — 20 5.21 Certification and Accreditation

4 Module 5_ Risk Mitigation — 3 5.4 Security Program Requirements

4 Module 5_ Risk Mitigation — 4 5.5 Essential Elements of an Information Security Program

4 Module 5_ Risk Mitigation — 5 5.6 Introduction to Information Security Frameworks – ISO 27002

4 Module 5_ Risk Mitigation — 6 5.7 Information Security Frameworks

4 Module 5_ Risk Mitigation — 7 5.8 Information Security Architecture

4 Module 5_ Risk Mitigation — 8 5.9 Security Operations Event Monitoring

4 Module 5_ Risk Mitigation — 9 5.10 Secure Engineering and Threat Modeling

5 Module 6_ Risk Monitoring and Control — 0 6.1 Risk, Control Monitoring, and Reporting

5 Module 6_ Risk Monitoring and Control — 1 6.2 Key Risk Indicators (KRIs)

5 Module 6_ Risk Monitoring and Control — 2 6.3 Tools for Risk Monitoring

 

 

CRISC – Certified in Risk and Information Systems Control

 

 

CRISC Module 1 Part 1 – Introduction

CRISC Module 1 Part 2 – Introduction

CRISC Module 2 Part 1 – Risk Identification

CRISC Module 2 Part 2 – Risk Identification

CRISC Module 2 Part 3 – Risk Identification

CRISC Module 2 Part 4 – Risk Identification

CRISC Module 3 Part 1 – Risk Assessment

CRISC Module 3 Part 2 – Risk Assessment

CRISC Module 3 Part 3 – Risk Assessment

CRISC Module 4 Part 01 – Risk Response

CRISC Module 4 Part 02 – Risk Response

CRISC Module 4 Part 03 – Risk Response

CRISC Module 4 Part 04 – Risk Response

CRISC Module 4 Part 05 – Risk Response

CRISC Module 4 Part 06 – Risk Response

CRISC Module 4 Part 07 – Risk Response

CRISC Module 4 Part 08 – Risk Response

CRISC Module 4 Part 09 – Risk Response

CRISC Module 4 Part 10 – Risk Response

CRISC Module 4 Part 11 – Risk Response

CRISC Module 4 Part 12 – Risk Response

CRISC Module 4 Part 13 – Risk Response

CRISC Module 4 Part 14 – Risk Response

CRISC Module 4 Part 15 – Risk Response

CRISC Module 4 Part 16 – Risk Response

CRISC Module 4 Part 17 – Risk Response

CRISC Module 5 Part 1 – Risk Monitoring & Reporting

CRISC Module 5 Part 2 – Risk Monitoring & Reporting

CRISC Module 5 Part 3 – Risk Monitoring & Reporting

CRISC Module 5 Part 4 – Risk Monitoring & Reporting

 

 

CRISC-Review-Manual-6th-Edition.pdf

 

ISACA-CRISC-Questions-and-Answers.pdf

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Quick Navigation
×
×

Cart