Certified in Risk and Information Systems Control (CRISC) Training

Print Friendly, PDF & Email
Introduction

Certified in Risk and Information Systems Control (CRISC) Training Course with Hands-on Labs (Online, Onsite and Classroom Live)

Get ready for the CRISC exam with our top-quality preparation CRISC Certification Training course.

Certified in Risk and Information Systems Control (CRISC) was developed by ISACA so students could enhance their understanding of the impact of IT risk and identify how it relates to their organization. This CRISC Certification Training will provide students with a comprehensive review of the unique challenges surrounding IT and enterprise risk management. Needless to say, CRISC is typically a great choice for those interested in establishing a common perspective and language about IT risk that can set the standard for their own enterprise.

Duration: 4 days

Your Registration Includes

  • 4 Days of CRISC Training from an Authorized ISACA Instructor
  • ISACA issued CRISC Training Courseware / Review Manual
  • ISACA issued CRISC Review Questions, Answers & Explanations (QAE)

*CRISC Exam Voucher Available for Additional Cost ($710 USD)*

Resources:
  • CRISC Certification Training Study Guide by ExamREVIEW – Thriftbooks.com
  • CRISC Certification Training All-in-One Exam Guide by Bobby E. Rogers; Dawn Dunkerley – ebooks.com
  • CRISC Certification Training Exam Preparation Course by William Manning – vitalsource.com
  • Certified in Risk and Information Systems Control (CRISC) Review Manual by Isaca – Amazon.com
  • Certified in Risk and Information Systems Control (CRISC) A Complete Guide - 2020 Edition by Gerardus Blokdyk – Amazon.com
  • Certified in Risk and Information Systems Control (CRISC) Exam Questions by Pass For Life – Amazon.com
Related Courses
Customize It!
  • We can adapt this CRISC Certification Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CRISC Certification Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CRISC Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified in Risk and Information Systems Control (CRISC) Training course in manner understandable to lay audiences.
Audience / Target Group

Certified in Risk and Information Systems Control (CRISC) Training is intended for risk and control professionals. Sample job titles might include:

  • IT Professionals
  • Control Professionals
  • Project Managers
  • Risk Professionals
  • Business Analysts
  • Compliance Professionals
CRISC Certification Training - Class Prerequisites
  • At least three years cumulative work experience performing tasks across at least three of the CRISC domains is recommended.
CRISC Certification Training - Objectives:

Participants in the Certified in Risk and Information Systems Control (CRISC) Training program will be provided instruction designed to provide the following:

  • An understanding of the format and structure of the CRISC certification exam
  • A knowledge of the various topics and technical areas covered by the exam
  • Practice with specific strategies, tips and techniques for taking and passing the exam
  • Opportunities to execute practice questions with debriefs of answers
CRISC Certification Training - Course Content:

Module 1: Introduction to the ISACA CRISC Exam

  • Class Overview
  • CRISC Domains
  • Test Registration

Module 2: Risk Identification

  • Good Practices for Risk Management
  • Components of Risk Management
  • Methods for Risk Identification
  • Risk Culture and Communication
  • The Businesses IT Risk Structure
  • Risk Principles and Concepts
  • Vulnerabilities and Threats
  • Assets
  • Threats
  • Vulnerabilities
  • Vulnerability Assessment
  • Pen Testing
  • Probability/Likelihood
  • IT Risk
  • IT Risk Scenarios
  • Ownership and Accountability
  • Other Risk Concepts
  • Risk Awareness

Module 3: IT Risk Assessment

  • Risk Assessment vs. Risk Identification
  • Techniques for Risk Assessment
  • Risk Scenarios
  • Analyzing the Current State of Controls
  • Risk and Control Analysis
  • Risk Analysis Techniques
  • Incident Response
  • Business Risk
  • Risk Associated with Enterprise Architecture
  • Management of Data
  • Emerging Technologies and Threats
  • Industry Trends
  • Third Party Management
  • Project and Program Management
  • SDLC
  • Recovery and Business Continuity
  • Risk Assessment Reports
  • Ownership of Risk and Accountability
  • Communication of Report Results

Module 4: Risk Response

  • Risk Response and Business Objectives Alignment
  • Response Options
  • Techniques for Analysis
  • New Controls and Related Vulnerabilities
  • A Risk Action Plan
  • Techniques for BPR
  • Design and Implementation of Controls
  • Control Monitoring
  • Inherent and Residual Risk
  • Control Objectives Practices and Metrics
  • Cryptography as a Control
  • Control Design and Implementation
  • Emerging Technologies and Controls
  • Ownership of Controls
  • Management Procedures and Documentation
  • Response and Action Plan

Module 5: Risk and Control Monitoring and Reporting

  • Key Risk Indicators
  • Risk Management Life Cycle
  • Key Performance and Goal Indicators
  • Data Collection and Extracting Techniques
  • Changes in Risk Profile
  • Monitoring Controls
  • Control Assessment Types
  • Control Assessment Results
  • Risk Profile Changes

Module 6: Test Review

  • Key Risk Indicators
  • Test Review
  • Test Registration
  • Test Preparation
  • Certification Maintenance

Labs

Request More Information

Time Frame: 0-3 Months4-12 Months

0