Training Courses

search courses

CRISC: Certified in Risk and Information Systems Control with exam

Guaranteed to Run Scheduled Fully Booked
Location
Auldhouse Anywhere
Sep 2022
5
Code: CRISC
Length: 4 Days
Overview

Modern businesses face a diverse collection of obstacles, potential dangers and risk exposure. ISACA’s Certified in Risk and Information Systems Control (CRISC®) certification indicates expertise in identifying and managing enterprise IT risk, and implementing and maintaining information systems controls. This course and certification is designed for mid-career IT and business professionals who identify and manage risk through the development, implementation and maintenance of appropriate information systems (IS) controls. CRISC certification confirms an individual’s skills and knowledge to secure the modern enterprise against escalating threats.

Delivery format(s)
Classroom
Classroom
Anywhere
Anywhere
OBJECTIVES
The CRISC Exam Preparation course is an intensive, four-day review program to prepare individuals who are planning to sit for the Certified in Risk and Information Systems Control (CRISC) exam. The course focuses on the key points covered in the CRISC Review Manual and includes class lectures, group discussions, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in IT and enterprise risk management.
PREREQUISITES

There are no prerequisites for taking this course or the CRISC Exam. However, in order to apply for CRISC certification, the candidate must meet the necessary experience requirements as determined by ISACA.

To obtain the CRISC Certification, a candidate must pass the CRISC Exam and have the relevant full-time work experience in the CRISC exam content outline: Three or more years of experience in IT risk management and IS control.

WHAT YOU’LL LEARN

CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyse, evaluate, assess, prioritise and respond to risks. This enhances benefits realisation and delivers optimal value to stakeholders.

WHO SHOULD ATTEND

This course is designed for mid-career IT and business professionals, including:

  • Security Directors, Managers, and Consultants
  • Compliance/Risk/Privacy Directors and Managers
  • IT Audit Directors, Managers, and Consultants
  • Compliance/Risk/Control Staff
COURSE OUTLINE

Domain 1: Governance

A. Organisational Governance

  • Organisational Strategy, Goals, and Objectives
  • Organisational Structure, Roles, and Responsibilities
  • Organisational Culture
  • Policies and Standards
  • Business Processes
  • Organisational Assets

B. Risk Governance

  • Enterprise Risk Management and Risk Management Framework
  • Three Lines of Defense
  • Risk Profile
  • Risk Appetite and Risk Tolerance
  • Legal, Regulatory, and Contractual Requirements
  • Professional Ethics of Risk Management

Domain 2: IT Risk Assessment

A. IT Risk Identification

  • Risk Events (e.g., contributing conditions, loss result)
  • Threat Modelling and Threat Landscape
  • Vulnerability and Control Deficiency Analysis (e.g., root cause analysis)
  • Risk Scenario Development

B. IT Risk Analysis and Evaluation

  • Risk Assessment Concepts, Standards, and Frameworks
  • Risk Register
  • Risk Analysis Methodologies
  • Business Impact Analysis
  • Inherent and Residual Risk

Domain 3: Risk Response and Reporting

A. Risk Response

  • Risk Treatment / Risk Response Options
  • Risk and Control Ownership
  • Third-Party Risk Management
  • Issue, Finding, and Exception Management
  • Management of Emerging Risk

B. Control Design and Implementation

  • Control Types, Standards, and Frameworks
  • Control Design, Selection, and Analysis
  • Control Implementation
  • Control Testing and Effectiveness Evaluation

C. Risk Monitoring and Reporting

  • Risk Treatment Plans
  • Data Collection, Aggregation, Analysis, and Validation
  • Risk and Control Monitoring Techniques
  • Risk and Control Reporting Techniques (heatmap, scorecards, dashboards)
  • Key Performance Indicators
  • Key Risk Indicators (KRIs)
  • Key Control Indicators (KCIs)

Domain 4: Information Technology and Security

A. Information Technology Principles

  • Enterprise Architecture
  • IT Operations Management (e.g., change management, IT assets, problems, incidents)
  • Project Management
  • Disaster Recovery Management (DRM)
  • Data Lifecycle Management
  • System Development Life Cycle (SDLC)
  • Emerging Technologies

B. Information Security Principles

  • Information Security Concepts, Frameworks, and Standards
  • Information Security Awareness Training
  • Business Continuity Management
  • Data Privacy and Data Protection Principles
  • Secondary Classifications

Enquiry Form