Price: 10 USD | Size: 4.83 GB | Duration : 11+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND : Expert TRAINING | ENGLISH | Bonus : ISACA CRISC PDF Guides | INSTANT DOWNLOAD
HOW TO DOWNLOAD THIS COURSE?You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download linksYou can Download This Course immediately from the click that Links
ISACA CRISC - Certified in Risk and Information Systems Control Video Training Course & PDF Guides Download
Duration : 11.30 Hours
Size: 4.83 GB
ISACA CRISC - Certified in Risk and Information Systems Control
0 Module 1_ Welcome and Intro -- 0 1.1 Welcome and Introduction
0 Module 1_ Welcome and Intro -- 1 1.2 Who is ISACA_
0 Module 1_ Welcome and Intro -- 2 1.3 Who Should Take the CRISC_
0 Module 1_ Welcome and Intro -- 3 1.4 The Exam
1 Module 2_ Preliminary -- 0 2.1 Introduction to Information Security Risks
1 Module 2_ Preliminary -- 1 2.2 Risk Governance vs. Risk Management
1 Module 2_ Preliminary -- 2 2.3 Risk Definitions
1 Module 2_ Preliminary -- 3 2.4 IT Risk Management
1 Module 2_ Preliminary -- 4 2.5 IT Security Basics
1 Module 2_ Preliminary -- 5 2.6 Risk Management for IT Projects
1 Module 2_ Preliminary -- 6 2.7 ISACA_s Framework and Lifecycle
1 Module 2_ Preliminary -- 7 2.8 Review Questions
2 Module 3_ Risk Identification -- 0 3.1 Risk Identification Intro
2 Module 3_ Risk Identification -- 1 3.2 ISO 27005 Framework
2 Module 3_ Risk Identification -- 10 3.11 Risk Culture
2 Module 3_ Risk Identification -- 11 3.12 Roles and Responsibilities
2 Module 3_ Risk Identification -- 12 3.13 The Risk Register
2 Module 3_ Risk Identification -- 13 3.14 Risk Scenarios
2 Module 3_ Risk Identification -- 14 3.15 Hardware and Software Risks
2 Module 3_ Risk Identification -- 15 3.16 Network Risks
2 Module 3_ Risk Identification -- 16 3.17 Emerging Risks
2 Module 3_ Risk Identification -- 17 3.18 Third Party Risks
2 Module 3_ Risk Identification -- 2 3.3 NIST 800-39 Risk Framing
2 Module 3_ Risk Identification -- 3 3.4 NIST 800-39 Risk Assessment
2 Module 3_ Risk Identification -- 4 3.5 NIST 800-39 Risk Response
2 Module 3_ Risk Identification -- 5 3.6 NIST 800-39 Risk Monitoring
2 Module 3_ Risk Identification -- 6 3.7 NIST 800-30 Intro
2 Module 3_ Risk Identification -- 7 3.8 NIST 800-30 Risk Assessment Methodology
2 Module 3_ Risk Identification -- 8 3.9 NIST 800-37 Revision 1 and Revision 2
2 Module 3_ Risk Identification -- 9 3.10 Alignment with the Business
3 Module 4_ Risk Assessment -- 0 4.1 Risk Assessment Intro
3 Module 4_ Risk Assessment -- 1 4.2 Tools and Techniques Part 1
3 Module 4_ Risk Assessment -- 2 4.3 Tools and Techniques Part 2
3 Module 4_ Risk Assessment -- 3 4.4 Business Impact Analysis
3 Module 4_ Risk Assessment -- 4 4.5 Controls Assessment
3 Module 4_ Risk Assessment -- 5 4.6 Stride Threat Modeling
3 Module 4_ Risk Assessment -- 6 4.7 Gap Analysis
3 Module 4_ Risk Assessment -- 7 4.8 Risk Analysis Methodologies
3 Module 4_ Risk Assessment -- 8 4.9 Risk Assessment Report
4 Module 5_ Risk Mitigation -- 0 5.1 Risk Mitigation Reduction
4 Module 5_ Risk Mitigation -- 1 5.2 Risk Mitigation Transference and Acceptance
4 Module 5_ Risk Mitigation -- 10 5.11 Protecting the Network - Segmentation
4 Module 5_ Risk Mitigation -- 11 5.12 Protecting the Network - Wireless Security
4 Module 5_ Risk Mitigation -- 12 5.13 Protecting the Network - Services
4 Module 5_ Risk Mitigation -- 13 5.14 Protecting the Network Through Detection and Network Access Control
4 Module 5_ Risk Mitigation -- 14 5.15 Data and Endpoint Security
4 Module 5_ Risk Mitigation -- 15 5.16 Selecting a Mitigation Strategy
4 Module 5_ Risk Mitigation -- 16 5.17 Types of Mitigating Controls
4 Module 5_ Risk Mitigation -- 17 5.18 Identity and Access Management
4 Module 5_ Risk Mitigation -- 18 5.19 Third Party Governance
4 Module 5_ Risk Mitigation -- 19 5.20 Policies, Procedures, Standards, and Guidelines
4 Module 5_ Risk Mitigation -- 2 5.3 Information Security Concepts
4 Module 5_ Risk Mitigation -- 20 5.21 Certification and Accreditation
4 Module 5_ Risk Mitigation -- 3 5.4 Security Program Requirements
4 Module 5_ Risk Mitigation -- 4 5.5 Essential Elements of an Information Security Program
4 Module 5_ Risk Mitigation -- 5 5.6 Introduction to Information Security Frameworks - ISO 27002
4 Module 5_ Risk Mitigation -- 6 5.7 Information Security Frameworks
4 Module 5_ Risk Mitigation -- 7 5.8 Information Security Architecture
4 Module 5_ Risk Mitigation -- 8 5.9 Security Operations Event Monitoring
4 Module 5_ Risk Mitigation -- 9 5.10 Secure Engineering and Threat Modeling
5 Module 6_ Risk Monitoring and Control -- 0 6.1 Risk, Control Monitoring, and Reporting
5 Module 6_ Risk Monitoring and Control -- 1 6.2 Key Risk Indicators (KRIs)
5 Module 6_ Risk Monitoring and Control -- 2 6.3 Tools for Risk Monitoring
CRISC - Certified in Risk and Information Systems Control
CRISC Module 1 Part 1 - Introduction
CRISC Module 1 Part 2 - Introduction
CRISC Module 2 Part 1 - Risk Identification
CRISC Module 2 Part 2 - Risk Identification
CRISC Module 2 Part 3 - Risk Identification
CRISC Module 2 Part 4 - Risk Identification
CRISC Module 3 Part 1 - Risk Assessment
CRISC Module 3 Part 2 - Risk Assessment
CRISC Module 3 Part 3 - Risk Assessment
CRISC Module 4 Part 01 - Risk Response
CRISC Module 4 Part 02 - Risk Response
CRISC Module 4 Part 03 - Risk Response
CRISC Module 4 Part 04 - Risk Response
CRISC Module 4 Part 05 - Risk Response
CRISC Module 4 Part 06 - Risk Response
CRISC Module 4 Part 07 - Risk Response
CRISC Module 4 Part 08 - Risk Response
CRISC Module 4 Part 09 - Risk Response
CRISC Module 4 Part 10 - Risk Response
CRISC Module 4 Part 11 - Risk Response
CRISC Module 4 Part 12 - Risk Response
CRISC Module 4 Part 13 - Risk Response
CRISC Module 4 Part 14 - Risk Response
CRISC Module 4 Part 15 - Risk Response
CRISC Module 4 Part 16 - Risk Response
CRISC Module 4 Part 17 - Risk Response
CRISC Module 5 Part 1 - Risk Monitoring & Reporting
CRISC Module 5 Part 2 - Risk Monitoring & Reporting
CRISC Module 5 Part 3 - Risk Monitoring & Reporting
CRISC Module 5 Part 4 - Risk Monitoring & Reporting
CRISC-Review-Manual-6th-Edition.pdf
ISACA-CRISC-Questions-and-Answers.pdf
ISACA CRISC - Certified in Risk and Information Systems Control Video Training C
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.