CRISC: Certified in Risk and Information Systems Control

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Introduction to Risk Management
-
1. Module Overview2m
-
2. Why study risk management?7m
-
3. What is IT for?5m
-
4. What does IT Governance help the company to understand?4m
-
5. What does IT Governance enable the enterprise to achieve?3m
-
6. Governance - General Topics3m
-
7. What is risk?5m
-
8. What are the main objectives of Risk Governance?4m
-
9. How do you know how much to spend to respond to a risk?2m
-
10. How to know in which control mechanisms should the company invest?4m
-
11. What is IT Risk Management?2m
-
12. What are the characteristics of a risk management program?6m
-
13. Key Points5m
-
14. Thank You!1m
IT Risk Identification
-
1. Module Overview2m
-
2. What does "IT Risk Identification" mean?4m
-
3. What is the difference between risk capacity, appetite and tolerance?6m
-
4. What is a company's "risk culture"?6m
-
5. How to carry out the correct communication of risks?4m
-
6. What are the elements that make up a risk?4m
-
7. What is the terminology for identifying risks?6m
-
8. What are "risk factors"?4m
-
9. What are the main public sources of vulnerabilities?1m
-
10. What is a "vulnerability assessment"?3m
-
11. What are the key principles for information security risks?5m
-
12. How can the risk professional avoid being seen as obstructive?3m
-
13. What are the roles involved in the risk management process?4m
-
14. What are the methods of identifying risks?2m
-
15. What is the risk identification process?2m
-
16. What is a "risk scenario"?4m
-
17. What is the risk register?2m
-
18. What are risk awareness programs?2m
-
19. Key Points6m
-
20. Thank you!1m
IT Risk Assessment
-
1. Module Overview2m
-
2. But after all, what has not yet been done in identifying risks?4m
-
3. What are the techniques used to assess IT risks?2m
-
4. What are the factors that affect the calculation of risk assessment?7m
-
5. What are the types of security controls?4m
-
6. How to check the current state of security controls?5m
-
7. What other sources of risk should be evaluated?3m
-
8. How is IT risk assessment done?3m
-
9. What are the methodologies for risk assessment?3m
-
10. How is risk classification performed?3m
-
11. Key Points5m
-
12. Thank You!1m
IT Risk Response and Mitigation
-
1. Module Overview1m
-
2. Is not it just eliminating all the identified risks?3m
-
3. What are the options for responding to risks?7m
-
4. What are the key techniques for determining the best response to risks?4m
-
5. What are the types of risks?3m
-
6. Key Points3m
-
7. Thank You!2m
Risk and Control Monitoring and Reporting
-
1. Module Overview2m
-
2. What are Key Risk Indicators?4m
-
3. What are the benefits of KRIs?2m
-
4. What are key performance indicators?3m
-
5. What data sources can be used for risk monitoring and reporting?7m
-
6. What are the types of assessments of safety controls and risks?4m
-
7. Key Points3m
-
8. Thank You!3m
Certification Test
-
1. Module Overview1m
-
2. Requirements5m
-
3. About the Test4m