CRISC Certification Course

by Jumping Bean

The Certified in Risk and Information Systems Control certificate shows that the certificate holder has expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls.  The certification focuses on risk identification, risk assessment, risk res

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Jumping Bean Logo

img Duration

Enquire Now

Course Details

The Certified in Risk and Information Systems Control certificate shows that the certificate holder has expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls.  The certification focuses on risk identification, risk assessment, risk response, and risk reporting.

 

Certified in Risk & Information Systems Control (CRISC) Course Outline

Domain 1—IT Risk Identification - (27%)

  • Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization’s business objectives and operations.

  • Identify potential threats and vulnerabilities to the organization’s people, processes, and technology to enable IT risk analysis.

  • Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact on business objectives and operations.

  • Identify key stakeholders for IT risk scenarios to help establish accountability.

  • Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.

  • Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.

  • Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.

Domain 2—IT Risk Assessment - (28%)

  • Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.

  • Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.

  • Review the results of risk and control analysis to assess any gaps between the current and desired states of the IT risk environment.

  • Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.

  • Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision-making.

  • Update the risk register with the results of the risk assessment.

Domain 3—Risk Response Mitigation - (23%)

  • Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.

  • Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).

  • Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.

  • Ensure that control ownership is assigned to establish clear lines of accountability.

  • Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.

  • Update the risk register to reflect changes in risk and management’s risk response.

  • Validate that risk responses have been executed according to the risk action plans.

Domain 4—Risk and Control Monitoring and Reporting - (22%)

  • Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.

  • Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.

  • Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision-making.

  • Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.

  • Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.

  • Review the results of control assessments to determine the effectiveness of the control environment.

  • Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making

  • Randburg Branch

    3 Appian Place 373 Kent Ave, Ferndale, Randburg, Johannesburg

Check out more CRISC courses in South Africa

Cape Peninsula University of Technology Logo

Cyber Security

Cyber Security course training is offered by Cape Peninsula University of Technology for all skill level. Security personnel working within the spheres of information and computer security as well as prospective students that want to embark on a career within the cyber security domain.

by Cape Peninsula University of Technology [Claim Listing ]
  • Price
  • Start Date
  • Duration
2KO Africa Logo

Implementing Cisco Cybersecurity Operations

2KO South Africa offers online Implementing Cisco Cybersecurity Operations (SECOPS) courses in South Africa for Cisco certification exam 210-255. 2KO is an IT consulting and training company, offering both business services and multi-platform training.

by 2KO Africa [Claim Listing ]
On The Ball College Logo

CompTIA Cybersecurity Analyst (CySA+)

This course focuses on defence and teaches the skills needed to apply behavioural analytics to the IT security environment. It fills the skills gap between Security+ and CASP+.

by On The Ball College [Claim Listing ]
  • Price
  • Start Date
  • Duration
CA College Logo

Cyber Security Risk Management

In recent years, cyber security has become vital in all organizations. There is a growing need to become familiar with all aspects of cyber security such as Blockchain, Big Data, IoT, etc.

by CA College
  • Price
  • Start Date
  • Duration
Mecer Inter-Ed Logo

Cyber Secure Coder

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery.

by Mecer Inter-Ed [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy