Certified In Risk And Information Systems Control (CRISC) Certification Training

by Vinsys

Certified in Risk and Information Systems Control (CRISC) is an ISACA certification that demonstrates the holders ability to evaluate and identify IT risk and support enterprises accomplish their business objectives and long-term goals.

₹65000

Contact the Institutes

Fill this form

Advertisement

Vinsys Logo

img Duration

Please Enquire

Course Details

Certified in Risk and Information Systems Control (CRISC) is an ISACA certification that demonstrates the holders ability to evaluate and identify IT risk and support enterprises accomplish their business objectives and long-term goals.

Since its inception in 2010, CRISC has leveled up the skills of 20,000 professionals worldwide and IT risk management competence and their ability to design, monitor, implement and maintain effective information security controls.

This training at Vinsys prepares you for the 4-hour CRISC exam with a focused, practical approach.

 

Eligibility Criteria:

  • Candidates applying for the Certified in Risk and Information Systems Control (CRISC) course must have:
  • 3 years of experience in risk management and information security control
  • Basic computer knowledge

 

Course Outline:

  • DOMAIN 1: GOVERNANCE (26%)
  • This domain breaks down into two governance subcategories:
  • Organizational Governance A
  • Organizational strategy, goals, and objectives
  • Organizational structure, roles, and responsibilities
  • Organizational culture
  • Policies and standards
  • Business processes
  • Organizational assets
  • Risk Governance B
  • Enterprise risk management and risk management framework
  • Three lines of defense
  • Risk profile
  • Risk appetite and risk tolerance
  • Legal, regulatory and contractual requirements
  • Professional ethics of risk management
  • DOMAIN 2: IT RISK ASSESSMENT (20%)
  • This domain breaks down into two distinct sections:
  • IT Risk Identification A
  • Risk events (e.g., contributing conditions, loss result)
  • Threat modeling and threat landscape
  • Vulnerability and control deficiency analysis (e.g., root cause analysis)
  • Risk scenario development
  • IT Risk Analysis and Evaluation B
  • Risk assessment concepts, standards, and frameworks
  • Risk register
  • Risk analysis methodologies
  • Business impact analysis
  • Inherent and residual risk
  • DOMAIN 3: RISK RESPONSE AND REPORTING (32 PERCENT)
  • This domain is split into three sub-sections.
  • Risk Response A
  • Risk treatment/risk response options
  • Risk and control ownership
  • Third-party risk management
  • Issue, finding, and exception management
  • Management of emerging risk
  • Control Design and Implementation B
  • Control types, standards, and frameworks
  • Control design, selection, and analysis
  • Control implementation
  • Control testing and effectiveness evaluation
  • Risk Monitoring and Reporting C
  • Risk treatment plans
  • Data collection, aggregation, analysis, and validation
  • Risk and control monitoring techniques
  • Risk and control reporting techniques (heatmap, scorecards, and dashboards)
  • Key performance indicators
  • Key risk indicators (KRIs)
  • Key control indicators (KCIs)
  • DOMAIN 4: INFORMATION TECHNOLOGY AND SECURITY (22 PERCENT)
  • This domain is split into two sections.
  • Information Technology Principles A
  • Enterprise architecture
  • IT operations management (e.g., change management, IT assets, problems, and incidents)
  • Project management
  • Disaster recovery management (DRM)
  • Data lifecycle management
  • System development life cycle (SDLC)
  • Emerging technologies
  • Information Security Principles B
  • Information security concepts, frameworks, and standards
  • Information security awareness training
  • Business continuity management
  • Data privacy and data protection principle
  • Sector 62 Branch

    Akasa Business Centre, 3rd Floor, C-27, Trapezoid IT Park, Sector 62, Noida
  • Kothrud Branch

    Shivaji Niketan, Tejas Society, Behind Kothrud Bus Stand, Near Mantri Park, Kothrud, Pune
  • Madhapur Branch

    1st floor, Sai Prithvi Cyber Arcade, Hitech City Rd, above Bata show room, Megha Hills, Sri Rama Colony, Madhapur, Hyderabad

Check out more CRISC courses in India

Routing Switching Tigers Logo

Certified Information Systems Auditor (CISA)

This course is designed for anyone seeking The Certified Information Systems Auditor (CISA) certification. Topics covered in the CISA course include information systems and audit fundamentals, enterprise architecture, risk assessment and management.

by Routing Switching Tigers [Claim Listing ]
  • Price
  • Start Date
  • Duration
IEVISION IT Services Logo

COBIT 5 Foundation

COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the Governance and management of Enterprise IT (GEIT). The course thoroughly explains the elements of the COBIT 5 framework using a case study and interactive presentations.

by IEVISION IT Services [Claim Listing ]
QuickLearn Systems Logo

COBIT Foundation Training & Certification

In the COBIT 5 Foundation course, students will learn about the importance of an effective framework to enable business value and delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end.

by QuickLearn Systems [Claim Listing ]
Novelvista Learning Solutions Private Limited Logo

Certified Information Systems Security Professional (CISSP)

CISSP certification aligned with (ISC)² CBK 2018 and this training course aims towards delivering proper cybersecurity knowledge to professionals who want to accelerate their cybersecurity careers.

by Novelvista Learning Solutions Private Limited [Claim Listing ]
Dreamplus Logo

CISA Workshop

Certified Information Systems Auditor (CISA) is a certification issued by ISACA for the people in charge of ensuring that an organization’s IT and business systems are monitored, managed and protected.

by Dreamplus [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy