Certified in Risk and Information Systems Control (CRISC) Certification Course
One of the most comprehensive courses preparing you for the coveted CRISC certification from ISACA
ISACA’s Certified in Risk and Information Systems Control (CRISC) certification is a globally-acknowledged certificate that validates the holder's expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC has received over 15 global recognitions. This course prepares you for the CRISC exam with detailed content, PDFs, quizzes and more.
Benefits of choosing this course
Benefits of choosing the CRISC course
Prepares you for one of the most sought-after certifications in the enterprise risk management and control space
Detailed content on each domain gives you a strong chance to pass the CRISC examination
Teaches you the core concepts of IT risk management and shows you how to conduct a structured and repeatable risk assessment
Highlights of the CRISC course
4 domains with 10-20 sub-sections each
Downloadable study material for enhanced learning
Bolster your preparation with quizzes at the end of each domain
- Key Learning Objectives
- Downloads
- About
-
Key Learning Objectives
- Understand the Threats: You will gain updated insights into the current cybersecurity threats. This course will help you understand the most common forms of cyber attacks such as malware, ransomware, phishing, business email compromise and social engineering.
- Awareness about Threat Actors: With this course, we aim to bust some myths about who hackers really are, what they are after and what they can do. The course very simply breaks down the kind of personal and business damage that cyber criminals can cause today.
- Fundamentals of Information Security: The course covers the principles of confidentiality, integrity, and availability (CIA triad). It encourages you to think of the most important areas where time and resources should be invested.
- Privacy Principles and Regulations: You will get an overview of privacy laws and regulations that everyone should be aware of. The primary ones covered are GDPR and HIPAA. You'll be able to articulate the key principles of GDPR and explain the importance of privacy for the data subject.
- Risk Management, Governance and Compliance: You will be able to identify, analyse, and understand how to mitigate risks to information assets. You'll gain an understanding of what these information assets are and what Information Governance is all about.
- Cybersecurity Best Practices: We go into the best practices for securing both organisational and personal systems. The course offers simple strategies on how you can be safer online, mitigating human error and avoiding chances of misconfiguration.
- Incident Response and Recovery: This course covers, in some detail, how to prepare for, respond to, and recover from cybersecurity incidents effectively. You will understand how effective cyber incident response ensures minimised impact of cyber-attacks and downtime.
- Security Policies & a Culture of Security: The course shows you why cybersecurity awareness training is absolutely essential. It will also guide you through the development and implementation of comprehensive security policies and procedures.
-
Direct Downloads
Download the CSPE Course PDF here.
-
About
This course is designed for a broad, non-technical audience. It is easily accessible for anyone trying to garner a robust understanding of the ever-evolving cybersecurity threat landscape.
Curriculum
- 1.1 IT Risk Identification (0:44)
- 1.2 Risk Concepts (1:58)
- 1.3 Elements of Risk (1:24)
- 1.4 Risk Factors (1:15)
- 1.5 Assets (5:35)
- 1.6 Threats and Types of Threats (3:44)
- 1.7 Vulnerabilities, Vulnerability Assessment and Penetration Testing (2:46)
- 1.8 Likelihood (0:55)
- 1.9 Information Security Risk Concepts and Principles (0:53)
- 1.10 CIA Triad (3:16)
- 1.11 Non Repudiation (0:49)
- 1.12 IT Risk Strategy (0:20)
- 1.13 IT Concepts and Areas of Concern (4:33)
- 1.14 Risk Identification Methods (1:50)
- 1.15 Risk Identification Standards and Frameworks (4:55)
- 1.16 Risk Assessment Methodology (1:37)
- 1.17 IT Risk Scenarios (1:35)
- 1.18 Ownership and Accountability (1:00)
- 1.19 IT Risk Register (1:35)
- CRISC Domain 1 PDF
- Test Your Learning
- 2.1 IT Risk Assessment (0:35)
- 2.2 Risk Assessment (3:02)
- 2.3 Risk Assessment Techniques (7:41)
- 2.4 Risk Scenario Analysis - Control Categories (0:51)
- 2.5 Current State of Controls (2:34)
- 2.6 Changes in Risk Environment and Emerging Threats (1:18)
- 2.7 Reasons of Project & SDLC Failure (2:18)
- 2.8 Risk & Control Analysis (2:35)
- 2.9 Threat & Misuse Case Modeling (0:57)
- 2.10 Root Cause Analysis (1:09)
- 2.11 Gap Analysis (0:53)
- 2.12 Predicting Risk (0:54)
- 2.13 Risk Analysis Methodologies & Risk Ranking (8:17)
- 2.14 OCTAVE (6:35)
- 2.15 Risk Appetite Bands (0:35)
- 2.16 Risk Ownership & Accountability (1:01)
- 2.17 Documenting Risk Assessments (2:04)
- CRISC Domain 2 PDF
- Test Your Learning
- 3.1 Risk Response & Mitigations (0:51)
- 3.2 Risk Response Options (7:05)
- 3.3 Risk Response Analysis Techniques (2:00)
- 3.4 Cost Benefit Analysis (0:42)
- 3.5 Return on Investment (1:34)
- 3.6 Vulnerabilities Associated with New Controls (2:37)
- 3.7 Developing a Risk Action Plan (0:46)
- 3.8 Business Process Review Tools & Techniques (2:18)
- 3.9 Control Standards & Frameworks (8:46)
- 3.10 Control Activities, Objectives, Practices & Metrics - Business Processes (1:16)
- 3.11 Control Activities, Objectives, Practices & Metrics - Information Security (4:40)
- 3.12 Control Activities, Objectives, Practices & Metrics - Third Party Management (0:42)
- 3.13 Control Activities, Objectives, Practices & Metrics - Data Management (4:17)
- 3.14 Control Activities, Objectives, Practices & Metrics - Project, Program & Portfolio Management (0:18)
- 3.15 Control Activities, Objectives, Practices & Metrics - System Development Life Cycle (0:24)
- 3.16 Control Activities, Objectives, Practices & Metrics - Business Continuity & Disaster Recovery (0:27)
- 3.17 Control Activities, Objectives, Practices & Metrics - IT Operations Management & Acquisition (0:27)
- 3.18 Control Activities, Objectives, Practices & Metrics - Information Systems Architecture (1:33)
- 3.19 Systems Control Design & Implementation (3:48)
- 3.20 Systems Control Design & Implementation (3:59)
- CRISC Domain 3 PDF
- Test Your Learning
- 4.1 Risk & Control Monitoring & Reporting (0:36)
- 4.2 Key Risk Indicators (KRIs) (7:39)
- 4.3 Key Performance Indicators (KPIs) (2:27)
- 4.4 Data Collection & Extraction Tools & Techniques (4:06)
- 4.5 Monitoring Controls (2:46)
- 4.6 IS Audit (2:40)
- 4.7 Vulnerability Assessment (1:24)
- 4.8 Penetration Testing (0:50)
- 4.9 Third Party Assurance (1:00)
- 5.0 Results of Control Assessments (3:31)
- CRISC Domain 4 PDF
- Test Your Learning
Sign up and Start Today
Pay-in-full in your local currency (where available)
We take all major forms of payment and we use secure checkout.
Featured Courses
Our most popular courses and offers.