Certified In Risk And Information Systems Control (CRISC)

by Pearce Mayfield Claim Listing

CRISC certification allows us to evaluate and manage risk, which is specially designed to help IT, professionals. This course enables delegates to design, implement, monitor, and maintain controls for enterprises.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Pearce Mayfield Logo

img Duration

3 Days

Course Details

CRISC certification allows us to evaluate and manage risk, which is specially designed to help IT, professionals. This course enables delegates to design, implement, monitor, and maintain controls for enterprises. 

 

It covers topics, i.e. risk identification, assessment, response, and control monitoring and also includes the four most important domains of CRISC, which are:

  • IT risk identification
  • IT risk assessment
  • Risk response and mitigation
  • Risk and control monitoring and reporting

 

During this 3-days training course, delegates will gain knowledge of the methods and processes allied with risk identification, risk analysis, responding to risk, and controlling risk. Preparing for the CRISC exam will be an important focus throughout the training course.

 Delegates will learn about all the four domains of the CRISC exam, and they will also be provided with a whole revision program with knowledge assessment, discussions, exercises and model questions.

 

Course Outline:

  • Introduction to CRISC
  • Objectives
  • About CRISC
  • Overview of CRISC Domain
  • Value of CRISC
  • Domain 1: Risk Identification
  • Risk Identification Objectives and Overview
  • Concepts of IT Risk
  • Risk Management Standards
  • Risk Identification Frameworks
  • Assets
  • Threats
  • Vulnerabilities
  • Elements of Risk
  • Penetration Testing
  • COBIT 5
  • ISO
  • Risk Scenarios
  • Communicating Risk
  • Risk Awareness
  • Organisational Structures and Culture
  • Risk within the Enterprise
  • Compliance
  • Principles of Risk
  • Conclusion
  • Domain 2: Risk Assessment
  • Risk Assessment Objectives
  • Risk Assessment Overview
  • Risk Assessment Techniques
  • Risk Assessment Analysis
  • Methodologies
  • Control Assessment
  • Risk Evaluation and Impact Assessment
  • Risk and Control Analysis
  • Third-Party Management
  • System Development Lifecycle
  • Developing Technologies
  • Enterprise Architecture
  • Conclusion
  • Domain 3: Risk Response and Mitigation
  • Risk Response and Mitigation Objectives and Overview
  • Risk Response Options
  • Response Analysis
  • Plans Risk Response
  • Control Objectives and Practices
  • Control Ownership
  • Systems Control Design Implementation
  • Control and Countermeasures
  • Business Continuity
  • Disaster Recovery
  • Risk Accountability
  • Inherent and Residual Risk
  • Conclusion
  • Domain 4: Risk, Control Monitoring and Reporting
  • Risk and Control Monitoring and Reporting Objectives
  • Risk and Control Monitoring and Reporting Overview
  • Key Risk Indicators (KRIs)
  • Data Collection
  • Monitoring Controls
  • Control Assessments
  • Penetration Testing
  • Vulnerability Assessments
  • Third-Party Assurance
  • Maturity Model Assessment
  • Techniques for Improvement
  • Capability Maturity Model
  • IT Risk Profile
  • Conclusion
  • Reading Branch

    Reflex, Cain Road, Reading

Check out more CRISC courses in UK

Datrix Training Logo

Certified Information Security Auditor course (CISA Training)

A Certified Information Security Auditor course (CISA Training) is ideal for anybody who wishes to have a career revolving around being an IT Auditor since it provides an insight into sound control and management of information security audit.

by Datrix Training [Claim Listing ]
Fox IT Logo

COBIT5 Foundation Training Course

This COBIT®5 Foundation training course enables delegates to gain knowledge and understanding of the COBIT5 guidance, understand the enterprise governance and management of enterprise IT, and create awareness with their business executives and senior IT management.

by Fox IT [Claim Listing ]
TSG Training Logo

Certified Information Systems Security Professional Training (CISSP)

The Official (ISC)²® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.

by TSG Training [Claim Listing ]
Purple Griffon Logo

ISO 27001: 2022 Certified ISMS Transition

Our one-day ISO 27001: 2022 Certified ISMS Transition training course will help you to understand the changes and new requirements in the ISO 27001: 2022 standard.

by Purple Griffon [Claim Listing ]
Glasgow Maritime Academy Logo

MCA approved Proficiency in Security Awareness Course (PSA)

This training/instruction must meet the requirements of Section A-VI/6 paragraph 4 of the amended STCW code. This training leads to the issue of a STCW Certificate of Proficiency in Security Awareness.

by Glasgow Maritime Academy [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy