TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
ISACA
Certified in Risk and Information Systems Control® (CRISC®)
Curriculum
9 Sections
52 Lessons
15 Hours
Expand all sections
Collapse all sections
01. Organizational Governance
6
1.1
Organizational Assets
1.2
Business Processes
1.3
Policies and Standards
1.4
Organizational Structure, Roles, and Responsibilities
1.5
Organizational Strategy, Goals, and Objectives
1.6
Organizational Culture
02. Risk Governance
6
2.1
Professional Ethics of Risk Management
2.2
Legal, Regulatory and Contractual Requirements
2.3
Risk Appetite and Risk Tolerance
2.4
Risk Profile
2.5
Three Lines of Defense
2.6
Enterprise Risk Management and Risk Management Framework
03. IT Risk Identification
6
3.1
Risk Scenario Development
3.2
Vulnerability and Control Deficiency Analysis (Root Cause Analysis)
3.3
Threat Modelling and Threat Landscape
3.4
Loss Result
3.5
Risk Events
3.6
Contributing Conditions
04. IT Risk Analysis and Evaluation
5
4.1
Inherent and Residual Risk
4.2
Business Impact Analysis
4.3
Risk Analysis Methodologies
4.4
Risk Register
4.5
Risk Assessment Concepts, Standards, and Frameworks
05. Risk Response
5
5.1
Management of Emerging Risk
5.2
Issue, Finding, and Exception Management
5.3
Third-Party Risk Management
5.4
Risk and Control Ownership
5.5
Risk Treatment / Risk Response Options
06. Control Design and Implementation
4
6.1
Control Testing and Effectiveness Evaluatio
6.2
Control Implementation
6.2
Control Types, Standards, and Frameworks
6.3
Control Design, Selection, and Analysis
07. Risk Monitoring and Reporting
10
7.1
Key Control Indicators (KCIs)
7.2
Key Performance Indicators (KPIs)
7.3
Dashboards
7.4
Key Risk Indicators (KRIs)
7.5
Scorecards
7.6
Heatmap
7.7
Risk and Control Reporting Techniques
7.8
Risk and Control Monitoring Techniques
7.9
Data Collection, Aggregation, Analysis, and Validation
7.10
Risk Treatment Plans
08. Information Technology Principles
6
8.1
Incidents
8.2
Problems
8.3
Change Management
8.4
IT Assets
8.5
IT Operations Management
8.6
Enterprise Architecture
09. Information Security Principles
4
9.1
Data Privacy and Data Protection Principles
9.2
Business Continuity Management
9.3
Information Security Awareness Training
9.4
Information Security Concepts, Frameworks, and Standards
This content is protected, please
login
and
enroll
in the course to view this content!