Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified in Risk and Information Systems Control (CRISC) Certification Course
CRISC
Course Objectives (3:08)
Introduction to CRISC (0:53)
Importance of IT Risk Management (2:44)
IT Risk Management Lifecycle (6:28)
CRISC Agenda PDF
CRISC Introduction PDF
Domain 1: IT Risk Identification
1.1 IT Risk Identification (0:44)
1.2 Risk Concepts (1:58)
1.3 Elements of Risk (1:24)
1.4 Risk Factors (1:15)
1.5 Assets (5:35)
1.6 Threats and Types of Threats (3:44)
1.7 Vulnerabilities, Vulnerability Assessment and Penetration Testing (2:46)
1.8 Likelihood (0:55)
1.9 Information Security Risk Concepts and Principles (0:53)
1.10 CIA Triad (3:16)
1.11 Non Repudiation (0:49)
1.12 IT Risk Strategy (0:20)
1.13 IT Concepts and Areas of Concern (4:33)
1.14 Risk Identification Methods (1:50)
1.15 Risk Identification Standards and Frameworks (4:55)
1.16 Risk Assessment Methodology (1:37)
1.17 IT Risk Scenarios (1:35)
1.18 Ownership and Accountability (1:00)
1.19 IT Risk Register (1:35)
CRISC Domain 1 PDF
Test Your Learning
Domain 2: IT Risk Assessment
2.1 IT Risk Assessment (0:35)
2.2 Risk Assessment (3:02)
2.3 Risk Assessment Techniques (7:41)
2.4 Risk Scenario Analysis - Control Categories (0:51)
2.5 Current State of Controls (2:34)
2.6 Changes in Risk Environment and Emerging Threats (1:18)
2.7 Reasons of Project & SDLC Failure (2:18)
2.8 Risk & Control Analysis (2:35)
2.9 Threat & Misuse Case Modeling (0:57)
2.10 Root Cause Analysis (1:09)
2.11 Gap Analysis (0:53)
2.12 Predicting Risk (0:54)
2.13 Risk Analysis Methodologies & Risk Ranking (8:17)
2.14 OCTAVE (6:35)
2.15 Risk Appetite Bands (0:35)
2.16 Risk Ownership & Accountability (1:01)
2.17 Documenting Risk Assessments (2:04)
CRISC Domain 2 PDF
Test Your Learning
Domain 3: Risk Response & Mitigations
3.1 Risk Response & Mitigations (0:51)
3.2 Risk Response Options (7:05)
3.3 Risk Response Analysis Techniques (2:00)
3.4 Cost Benefit Analysis (0:42)
3.5 Return on Investment (1:34)
3.6 Vulnerabilities Associated with New Controls (2:37)
3.7 Developing a Risk Action Plan (0:46)
3.8 Business Process Review Tools & Techniques (2:18)
3.9 Control Standards & Frameworks (8:46)
3.10 Control Activities, Objectives, Practices & Metrics - Business Processes (1:16)
3.11 Control Activities, Objectives, Practices & Metrics - Information Security (4:40)
3.12 Control Activities, Objectives, Practices & Metrics - Third Party Management (0:42)
3.13 Control Activities, Objectives, Practices & Metrics - Data Management (4:17)
3.14 Control Activities, Objectives, Practices & Metrics - Project, Program & Portfolio Management (0:18)
3.15 Control Activities, Objectives, Practices & Metrics - System Development Life Cycle (0:24)
3.16 Control Activities, Objectives, Practices & Metrics - Business Continuity & Disaster Recovery (0:27)
3.17 Control Activities, Objectives, Practices & Metrics - IT Operations Management & Acquisition (0:27)
3.18 Control Activities, Objectives, Practices & Metrics - Information Systems Architecture (1:33)
3.19 Systems Control Design & Implementation (3:48)
3.20 Systems Control Design & Implementation (3:59)
CRISC Domain 3 PDF
Test Your Learning
Domain 4: Risk & Control Monitoring & Reporting
4.1 Risk & Control Monitoring & Reporting (0:36)
4.2 Key Risk Indicators (KRIs) (7:39)
4.3 Key Performance Indicators (KPIs) (2:27)
4.4 Data Collection & Extraction Tools & Techniques (4:06)
4.5 Monitoring Controls (2:46)
4.6 IS Audit (2:40)
4.7 Vulnerability Assessment (1:24)
4.8 Penetration Testing (0:50)
4.9 Third Party Assurance (1:00)
5.0 Results of Control Assessments (3:31)
CRISC Domain 4 PDF
Test Your Learning
3.17 Control Activities, Objectives, Practices & Metrics - IT Operations Management & Acquisition
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock