Certified Risk and Information Systems Control (CRISC) Training

by Learning Tree Claim Listing

This official ISACA CRISC training provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and control monitoring and reporting.

£2745

Contact the Institutes

Fill this form

Advertisement

Learning Tree Logo

img Duration

4 Days

Course Details

This official ISACA CRISC training provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and control monitoring and reporting.

IT and enterprise risk management is key to an organisation’s operations and strategy. If you are an Information Technology professional, risk and control professional, business analyst, project manager or compliance professional, this Certified Risk and Information Systems Control training course will teach you to defend, protect and future-proof your enterprise.

 

CRISC Training Information

In this course, you will:

  • Prepare for and pass the Certified Risk and Information System Controls (CRISC) exam.

  • Identify the universe of IT risk to contribute to the execution of the IT risk management strategy.

  • Analyse and evaluate IT risk to determine the likelihood and impact on business objectives.

  • Determine risk response options and evaluate their efficiency and effectiveness to manage risk.

  • Continuously monitor and report on IT risk and controls.

 

Training Prerequisites

To earn CRISC certification, you must pass the CRISC exam and show three years experience in the fields of risk management and IS control, per ISACA's requirements.

 

Certification Information

This is an ISACA certification prep course.

The ISACA Exam Candidate Information Guide provides valuable information regarding exam day rules and information as well as exam dates and deadlines. 

 

CRISC Training Outline

Domain 1 — IT Risk Identification

  • 1.1: Collect and review information, including existing documentation, regarding the organisation’s internal and external business and IT environments to identify potential or realised impacts of IT risk to the organisation’s business objectives and operations.

  • 1.2: Identify potential threats and vulnerabilities to the organisation’s people, processes and technology to enable IT risk analysis.

  • 1.3: Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.

  • 1.4: Identify key stakeholders for IT risk scenarios to help establish accountability.

  • 1.5: Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.

  • 1.6: Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.

  • 1.7: Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.

 

Domain 2 — IT Risk Assessment

  • 2.1: Analyse risk scenarios based on organisational criteria (e.g., organisational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.

  • 2.2: Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.

  • 2.3: Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.

  • 2.4: Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.

  • 2.5: Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.

  • 2.6: Update the risk register with the results of the risk assessment.

 

Domain 3 — Risk Response and Mitigation

  • 3.1: Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.

  • 3.2: Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).

  • 3.3: Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.

  • 3.4: Ensure that control ownership is assigned to establish clear lines of accountability.

  • 3.5: Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.

  • 3.6: Update the risk register to reflect changes in risk and management’s risk response.

  • 3.7: Validate that risk responses have been executed according to the risk action plans.

 

Domain 4 — Risk and Control Monitoring and Reporting

  • 4.1: Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.

  • 4.2: Monitor and analyse key risk indicators (KRIs) to identify changes or trends in the IT risk profile.

  • 4.3: Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.

  • 4.4: Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.

  • 4.5: Monitor and analyse key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.

  • 4.6: Review the results of control assessments to determine the effectiveness of the control environment.

  • 4.7: Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making.

  • London Branch

    Floor 8 One Canada Square Canary Wharf, London

Check out more CRISC courses in UK

Bywater Training Limited Logo

ISO 27001 Lead Auditor Training Course

Auditing is an essential tool in the battle to identify, assess and address information security risks posed by challenges such as employee error and data breaches.

by Bywater Training Limited [Claim Listing ]
BSI Training Academy Logo

Certified Information Systems Auditor (CISA®)

ou'll also get the knowledge, skills and best practices to successfully audit, control and secure your information system. This course will prepare you with the knowledge you need to complete the ISACA CISA multiple choice exam, which gives you Certified Information Systems Auditor status.

by BSI Training Academy [Claim Listing ]
NoblePRog (UK) Logo

CISA - Certified Information Systems Auditor

CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. Our CISA course is an intense, very competitive and exam focused training course.

by NoblePRog (UK) [Claim Listing ]
Firebrand Logo

ISO 27001 Foundation (Information Security Management)

Learn the best practices for implementing and managing an Information Security Management System (ISMS) - as specified in ISO/IEC 27001:2013.

by Firebrand [Claim Listing ]
Fox IT Logo

COBIT5 Foundation Training Course

This COBIT®5 Foundation training course enables delegates to gain knowledge and understanding of the COBIT5 guidance, understand the enterprise governance and management of enterprise IT, and create awareness with their business executives and senior IT management.

by Fox IT [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy