Certified In Risk And Information Systems Control (CRISC) Certification Training

by Vinsys

Certified in Risk and Information Systems Control (CRISC) is an ISACA certification that demonstrates the holders ability to evaluate and identify IT risk and support enterprises accomplish their business objectives and long-term goals.

₹65000

Contact the Institutes

Fill this form

Advertisement

Vinsys Logo

img Duration

Please Enquire

Course Details

Certified in Risk and Information Systems Control (CRISC) is an ISACA certification that demonstrates the holders ability to evaluate and identify IT risk and support enterprises accomplish their business objectives and long-term goals.

Since its inception in 2010, CRISC has leveled up the skills of 20,000 professionals worldwide and IT risk management competence and their ability to design, monitor, implement and maintain effective information security controls.

This training at Vinsys prepares you for the 4-hour CRISC exam with a focused, practical approach.

 

Eligibility Criteria:

  • Candidates applying for the Certified in Risk and Information Systems Control (CRISC) course must have:
  • 3 years of experience in risk management and information security control
  • Basic computer knowledge

 

Course Outline:

  • DOMAIN 1: GOVERNANCE (26%)
  • This domain breaks down into two governance subcategories:
  • Organizational Governance A
  • Organizational strategy, goals, and objectives
  • Organizational structure, roles, and responsibilities
  • Organizational culture
  • Policies and standards
  • Business processes
  • Organizational assets
  • Risk Governance B
  • Enterprise risk management and risk management framework
  • Three lines of defense
  • Risk profile
  • Risk appetite and risk tolerance
  • Legal, regulatory and contractual requirements
  • Professional ethics of risk management
  • DOMAIN 2: IT RISK ASSESSMENT (20%)
  • This domain breaks down into two distinct sections:
  • IT Risk Identification A
  • Risk events (e.g., contributing conditions, loss result)
  • Threat modeling and threat landscape
  • Vulnerability and control deficiency analysis (e.g., root cause analysis)
  • Risk scenario development
  • IT Risk Analysis and Evaluation B
  • Risk assessment concepts, standards, and frameworks
  • Risk register
  • Risk analysis methodologies
  • Business impact analysis
  • Inherent and residual risk
  • DOMAIN 3: RISK RESPONSE AND REPORTING (32 PERCENT)
  • This domain is split into three sub-sections.
  • Risk Response A
  • Risk treatment/risk response options
  • Risk and control ownership
  • Third-party risk management
  • Issue, finding, and exception management
  • Management of emerging risk
  • Control Design and Implementation B
  • Control types, standards, and frameworks
  • Control design, selection, and analysis
  • Control implementation
  • Control testing and effectiveness evaluation
  • Risk Monitoring and Reporting C
  • Risk treatment plans
  • Data collection, aggregation, analysis, and validation
  • Risk and control monitoring techniques
  • Risk and control reporting techniques (heatmap, scorecards, and dashboards)
  • Key performance indicators
  • Key risk indicators (KRIs)
  • Key control indicators (KCIs)
  • DOMAIN 4: INFORMATION TECHNOLOGY AND SECURITY (22 PERCENT)
  • This domain is split into two sections.
  • Information Technology Principles A
  • Enterprise architecture
  • IT operations management (e.g., change management, IT assets, problems, and incidents)
  • Project management
  • Disaster recovery management (DRM)
  • Data lifecycle management
  • System development life cycle (SDLC)
  • Emerging technologies
  • Information Security Principles B
  • Information security concepts, frameworks, and standards
  • Information security awareness training
  • Business continuity management
  • Data privacy and data protection principle
  • Sector 62 Branch

    Akasa Business Centre, 3rd Floor, C-27, Trapezoid IT Park, Sector 62, Noida
  • Kothrud Branch

    Shivaji Niketan, Tejas Society, Behind Kothrud Bus Stand, Near Mantri Park, Kothrud, Pune
  • Madhapur Branch

    1st floor, Sai Prithvi Cyber Arcade, Hitech City Rd, above Bata show room, Megha Hills, Sri Rama Colony, Madhapur, Hyderabad

Check out more CRISC courses in India

Cybervault Securities Solutions Logo

CISA

CISA is a globally recognized certification meticulously designed for the professionals responsible for monitoring, managing, and protecting an organization’s IT and business environment.

by Cybervault Securities Solutions [Claim Listing ]
Codevirus Security Logo

CISA

The world is currently dealing with a number of issues caused by hackers who are disguising their activities as cyberattacks. These attacks are designed to cause significant harm, alter, modify, capture, or seize datasets.

by Codevirus Security [Claim Listing ]
UPTTI Logo

ISO 27001 : 2013

ISO 27001 : 2013 course is offered by UPTTI. We are providing best ISO & TPI Inspection Course. Certification can be a useful tool to add credibility, by demonstrating that your product or service meets the expectations of your customers.

by UPTTI [Claim Listing ]
QAI Global Institute Logo

COBIT5 Foundation

COBIT 5 is the latest edition of ISACA’s globally accepted framework. It provides an end-to-end business view of the governance of enterprise IT, reflecting the central role of information and technology in creating value for enterprises of all sizes.

by QAI Global Institute [Claim Listing ]
  • Price
  • Start Date
  • Duration
Trekskills Logo

Certified Information Systems Auditor (CISA) Certification And Training

Certified Information Systems Auditor (CISA)® is one of the world’s most popular information security/information technology auditing certifications for professionals worldwide.

by Trekskills [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy