Certified in Risk and Information Systems Control

Home  /  No Categories

Certified in Risk and Information Systems Control

Introduction 

CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise

The CRISC designation is designed for IT risk, control and compliance practitioners, business analysts, project managers and other resected professionals. The highly respected certification demonstrates to employers that the holder is able to identify and evaluate IT risk, and help their enterprise accomplish its business objectives. CRISC has received over 15 global recognitions.

Benefits

  • Excellent risk evaluation skillset which can be utilized to their distinct organization.
  • Proficiency to properly communicate multiple risk topics to a distinct stakeholder group.
  • Conviction of their company’s risk management and control plans

Who this course applies to:

  • Risk professionals
  • IT professionals
  • Project managers
  • Business analysts
  • Control professionals
  • Compliance professionals

Learning Objectives

  • Identifying IT Risk
  • Assessing IT Risk
  • Risk Response and Mitigation
  • Risk and Control Monitoring and Reporting

Structure of training

Domain 1: Risk Identification

  • Risk Identification Objectives
  • Risk Identification Overview
  • Concepts of IT Risk
  • Risk Management Standards
  • Risk Identification Frameworks
  • Assets
  • Threats
  • Vulnerabilities
  • Elements of Risk
  • Penetration Testing
  • COBIT 5
  • ISO
  • Risk Scenarios
  • Communicating Risk
  • Risk Awareness
  • Organisational Structures and Culture
  • Risk within the Enterprise
  • Compliance
  • Principles of Risk
  • Conclusion

Domain 2: Risk Assessment

  • Risk Assessment Objectives
  • Risk Assessment Overview
  • Risk Assessment Techniques
  • Risk Assessment Analysis
  • Methodologies
  • Control Assessment
  • Risk Evaluation and Impact Assessment
  • Risk and Control Analysis
  • Third Party Management
  • System Development Lifecycle
  • Developing Technologies
  • Enterprise Architecture
  • Conclusion

Domain 3: Risk Response and Mitigation

  • Risk Response and Mitigation Objectives
  • Risk Response and Mitigation Overview
  • Risk Response Options
  • Response Analysis
  • Risk Response Plans
  • Control Objectives and Practices
  • Control Ownership
  • Systems Control Design Implementation
  • Control and Countermeasures
  • Business Continuity
  • Disaster Recovery
  • Risk Accountability
  • Inherent and Residual Risk

Domain 4: Risk and Control Monitoring and Reporting

  • Risk and Control Monitoring and Reporting Objectives
  • Risk and Control Monitoring and Reporting Overview
  • Key Risk Indicators (KRIs)
  • Data Collection
  • Monitoring Controls
  • Control Assessments
  • Penetration Testing
  • Vulnerability Assessments
  • Third Party Assurance
  • Maturity Model Assessment
  • Techniques for Improvement
  • Capability Maturity Model
  • IT Risk Profile

Additional Information

For more information and pricing please reach out to us here or at https://www.cryptv-uk.com/contacts/ through our contacts page.

Date

Jul 26 - 27 2022
Expired!

More Info

Buy & Enrol Now
Buy & Enrol Now

Leave a Reply

Your email address will not be published. Required fields are marked *