top of page

Related Courses

ISACA CRISC - Certified in Risk and Information Systems Control Video Training C

Price: 10 USD | Size: 4.83 GB | Duration : 11+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND : Expert TRAINING | ENGLISH | Bonus : ISACA CRISC PDF Guides | INSTANT DOWNLOAD

 

HOW TO DOWNLOAD THIS COURSE?You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download linksYou can Download This Course immediately from the click that Links

 

ISACA CRISC - Certified in Risk and Information Systems Control Video Training Course & PDF Guides Download

 

 

Duration : 11.30 Hours

 

Size: 4.83 GB

 

ISACA CRISC - Certified in Risk and Information Systems Control

 

0 Module 1_ Welcome and Intro -- 0 1.1 Welcome and Introduction

0 Module 1_ Welcome and Intro -- 1 1.2 Who is ISACA_

0 Module 1_ Welcome and Intro -- 2 1.3 Who Should Take the CRISC_

0 Module 1_ Welcome and Intro -- 3 1.4 The Exam

1 Module 2_ Preliminary -- 0 2.1 Introduction to Information Security Risks

1 Module 2_ Preliminary -- 1 2.2 Risk Governance vs. Risk Management

1 Module 2_ Preliminary -- 2 2.3 Risk Definitions

1 Module 2_ Preliminary -- 3 2.4 IT Risk Management

1 Module 2_ Preliminary -- 4 2.5 IT Security Basics

1 Module 2_ Preliminary -- 5 2.6 Risk Management for IT Projects

1 Module 2_ Preliminary -- 6 2.7 ISACA_s Framework and Lifecycle

1 Module 2_ Preliminary -- 7 2.8 Review Questions

2 Module 3_ Risk Identification -- 0 3.1 Risk Identification Intro

2 Module 3_ Risk Identification -- 1 3.2 ISO 27005 Framework

2 Module 3_ Risk Identification -- 10 3.11 Risk Culture

2 Module 3_ Risk Identification -- 11 3.12 Roles and Responsibilities

2 Module 3_ Risk Identification -- 12 3.13 The Risk Register

2 Module 3_ Risk Identification -- 13 3.14 Risk Scenarios

2 Module 3_ Risk Identification -- 14 3.15 Hardware and Software Risks

2 Module 3_ Risk Identification -- 15 3.16 Network Risks

2 Module 3_ Risk Identification -- 16 3.17 Emerging Risks

2 Module 3_ Risk Identification -- 17 3.18 Third Party Risks

2 Module 3_ Risk Identification -- 2 3.3 NIST 800-39 Risk Framing

2 Module 3_ Risk Identification -- 3 3.4 NIST 800-39 Risk Assessment

2 Module 3_ Risk Identification -- 4 3.5 NIST 800-39 Risk Response

2 Module 3_ Risk Identification -- 5 3.6 NIST 800-39 Risk Monitoring

2 Module 3_ Risk Identification -- 6 3.7 NIST 800-30 Intro

2 Module 3_ Risk Identification -- 7 3.8 NIST 800-30 Risk Assessment Methodology

2 Module 3_ Risk Identification -- 8 3.9 NIST 800-37 Revision 1 and Revision 2

2 Module 3_ Risk Identification -- 9 3.10 Alignment with the Business

3 Module 4_ Risk Assessment -- 0 4.1 Risk Assessment Intro

3 Module 4_ Risk Assessment -- 1 4.2 Tools and Techniques Part 1

3 Module 4_ Risk Assessment -- 2 4.3 Tools and Techniques Part 2

3 Module 4_ Risk Assessment -- 3 4.4 Business Impact Analysis

3 Module 4_ Risk Assessment -- 4 4.5 Controls Assessment

3 Module 4_ Risk Assessment -- 5 4.6 Stride Threat Modeling

3 Module 4_ Risk Assessment -- 6 4.7 Gap Analysis

3 Module 4_ Risk Assessment -- 7 4.8 Risk Analysis Methodologies

3 Module 4_ Risk Assessment -- 8 4.9 Risk Assessment Report

4 Module 5_ Risk Mitigation -- 0 5.1 Risk Mitigation Reduction

4 Module 5_ Risk Mitigation -- 1 5.2 Risk Mitigation Transference and Acceptance

4 Module 5_ Risk Mitigation -- 10 5.11 Protecting the Network - Segmentation

4 Module 5_ Risk Mitigation -- 11 5.12 Protecting the Network - Wireless Security

4 Module 5_ Risk Mitigation -- 12 5.13 Protecting the Network - Services

4 Module 5_ Risk Mitigation -- 13 5.14 Protecting the Network Through Detection and Network Access Control

4 Module 5_ Risk Mitigation -- 14 5.15 Data and Endpoint Security

4 Module 5_ Risk Mitigation -- 15 5.16 Selecting a Mitigation Strategy

4 Module 5_ Risk Mitigation -- 16 5.17 Types of Mitigating Controls

4 Module 5_ Risk Mitigation -- 17 5.18 Identity and Access Management

4 Module 5_ Risk Mitigation -- 18 5.19 Third Party Governance

4 Module 5_ Risk Mitigation -- 19 5.20 Policies, Procedures, Standards, and Guidelines

4 Module 5_ Risk Mitigation -- 2 5.3 Information Security Concepts

4 Module 5_ Risk Mitigation -- 20 5.21 Certification and Accreditation

4 Module 5_ Risk Mitigation -- 3 5.4 Security Program Requirements

4 Module 5_ Risk Mitigation -- 4 5.5 Essential Elements of an Information Security Program

4 Module 5_ Risk Mitigation -- 5 5.6 Introduction to Information Security Frameworks - ISO 27002

4 Module 5_ Risk Mitigation -- 6 5.7 Information Security Frameworks

4 Module 5_ Risk Mitigation -- 7 5.8 Information Security Architecture

4 Module 5_ Risk Mitigation -- 8 5.9 Security Operations Event Monitoring

4 Module 5_ Risk Mitigation -- 9 5.10 Secure Engineering and Threat Modeling

5 Module 6_ Risk Monitoring and Control -- 0 6.1 Risk, Control Monitoring, and Reporting

5 Module 6_ Risk Monitoring and Control -- 1 6.2 Key Risk Indicators (KRIs)

5 Module 6_ Risk Monitoring and Control -- 2 6.3 Tools for Risk Monitoring

 

 

CRISC - Certified in Risk and Information Systems Control

 

 

CRISC Module 1 Part 1 - Introduction

CRISC Module 1 Part 2 - Introduction

CRISC Module 2 Part 1 - Risk Identification

CRISC Module 2 Part 2 - Risk Identification

CRISC Module 2 Part 3 - Risk Identification

CRISC Module 2 Part 4 - Risk Identification

CRISC Module 3 Part 1 - Risk Assessment

CRISC Module 3 Part 2 - Risk Assessment

CRISC Module 3 Part 3 - Risk Assessment

CRISC Module 4 Part 01 - Risk Response

CRISC Module 4 Part 02 - Risk Response

CRISC Module 4 Part 03 - Risk Response

CRISC Module 4 Part 04 - Risk Response

CRISC Module 4 Part 05 - Risk Response

CRISC Module 4 Part 06 - Risk Response

CRISC Module 4 Part 07 - Risk Response

CRISC Module 4 Part 08 - Risk Response

CRISC Module 4 Part 09 - Risk Response

CRISC Module 4 Part 10 - Risk Response

CRISC Module 4 Part 11 - Risk Response

CRISC Module 4 Part 12 - Risk Response

CRISC Module 4 Part 13 - Risk Response

CRISC Module 4 Part 14 - Risk Response

CRISC Module 4 Part 15 - Risk Response

CRISC Module 4 Part 16 - Risk Response

CRISC Module 4 Part 17 - Risk Response

CRISC Module 5 Part 1 - Risk Monitoring & Reporting

CRISC Module 5 Part 2 - Risk Monitoring & Reporting

CRISC Module 5 Part 3 - Risk Monitoring & Reporting

CRISC Module 5 Part 4 - Risk Monitoring & Reporting

 

 

CRISC-Review-Manual-6th-Edition.pdf

 

ISACA-CRISC-Questions-and-Answers.pdf

ISACA CRISC - Certified in Risk and Information Systems Control Video Training C

SKU: EXT2021-0055
$10.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page