SlideShare a Scribd company logo
4
Most read
7
Most read
8
Most read
w w w . i n f o s e c t r a i n . c o m
W W W . I N F O S E C T R A I N . C O M
w w w . i n f o s e c t r a i n . c o m
CRISC Introduction
Certified in Risk and Information System Control (CRISC) certification training program at Infosec Train is developed for
those professionals who identify and manage the enterprise risks by implementing information system controls. The
training will help you understand the impacts of IT risks and gain technical expertise in implementing proper information
security controls to confront the challenges posed by these risks.
CRISC is the most current and rigorous assessment available to evaluate IT professionalsโ€™ risk management proficiency
and other employees within an enterprise or financial institute.
Those who earn CRISC help enterprises understand business risks and have the technical knowledge to implement
appropriate IS controls.
w w w . i n f o s e c t r a i n . c o m
CRISC Course Highlights
100% Money Back Guarantee
Extended Post Training
Not satisfied with your training on Day 1?
You can get a refund or enroll in a different course.
Get extended support even after you finish your training.
Weโ€™re here for you until you reach your certification goals.
32-Hrs
Instructor-led Training
Accredited
Instructors
Telegram
Discussion Group
w w w . i n f o s e c t r a i n . c o m
Who Should Attend
CEOs/CFOs
CIOs/CISOs
Audit Partners/Heads
Security Managers/
Directors/Consultants
Chief Audit
Executives
Chief Compliance/
Privacy/Risk Officers
CISM Exam Information
Certification Certified in Risk and Information Systems Control
Exam Duration 4 Hours
Number of Questions 150
Exam Pattern Multiple Choice
Passing Marks 450 out of 800
Languages
English, French, German, Hebrew, Italian, Japanese,
Korean, Spanish, Turkish, Chinese
w w w . i n f o s e c t r a i n . c o m
Happy Learners Across the World
w w w . i n f o s e c t r a i n . c o m
w w w . i n f o s e c t r a i n . c o m
DOMAIN 1
GOVERNANCE
26%
DOMAIN 2
IT RISK ASSESSMENT
20%
DOMAIN 4
INFORMATION TECHNOLOGY
AND SECURITY
20%
CRISC Domains
32%
DOMAIN 3
RISK RESPONSE
AND REPORTING
w w w . i n f o s e c t r a i n . c o m
26% DOMAIN 1
GOVERNANCE
Aโ€”ORGANIZATIONAL GOVERNANCE
Bโ€”RISK GOVERNANCE
The governance domain interrogates your knowledge of information about an organizationโ€™s business and IT
environments, organizational strategy, goals and objectives, and examines potential or realized impacts of IT risk to
the organizationโ€™s business objectives and operations, including Enterprise Risk Management and Risk Management
Framework.
โ€ข Organizational Strategy, Goals, and Objectives
โ€ข Organizational Structure, Roles and Responsibilities
โ€ข Organizational Culture
โ€ข Policies and Standards
โ€ข Business Processes
โ€ข Organizational Assets
โ€ข Enterprise Risk Management and Risk Management Framework
โ€ข Three Lines of Defense
โ€ข Risk Profile
โ€ข Risk Appetite and Risk Tolerance
โ€ข Legal, Regulatory and Contractual Requirements
โ€ข Professional Ethics of Risk Management
w w w . i n f o s e c t r a i n . c o m
20% DOMAIN 2
IT RISK ASSESSMENT
Aโ€”IT RISK IDENTIFICATION
Bโ€”IT RISK ANALYSIS AND EVALUATION
This domain will certify your knowledge of threats and vulnerabilities to the organizationโ€™s people, processes and
technology as well as the likelihood and impact of threats, vulnerabilities and risk scenarios.
โ€ข Risk Events (e.g., contributing conditions, loss result)
โ€ข Threat Modelling and Threat Landscape
โ€ข Vulnerability and Control Deficiency Analysis (e.g., root cause analysis)
โ€ข Risk Scenario Development
โ€ข Risk Assessment Concepts, Standards and Frameworks
โ€ข Risk Register
โ€ข Risk Analysis Methodologies
โ€ข Business Impact Analysis
โ€ข Inherent and Residual Risk
w w w . i n f o s e c t r a i n . c o m
32% DOMAIN 3
RISK RESPONSE AND REPORTING
Aโ€”RISK RESPONSE
Bโ€”CONTROL DESIGN AND IMPLEMENTATION
Cโ€”RISK MONITORING AND REPORTING
This domain deals with the development and management of risk treatment plans among key stakeholders, the
evaluation of existing controls and improving effectiveness for IT risk mitigation, and the assessment of relevant risk and
control information to applicable stakeholders.
โ€ข Risk Treatment / Risk Response Options
โ€ข Risk and Control Ownership
โ€ข Third-Party Risk Management
โ€ข Issue, Finding and Exception Management
โ€ข Management of Emerging Risk
โ€ข Control Types, Standards and Frameworks
โ€ข Control Design, Selection and Analysis
โ€ข Control Implementation
โ€ข Control Testing and Effectiveness Evaluation
โ€ข Risk Treatment Plans
โ€ข Data Collection, Aggregation, Analysis and Validation
โ€ข Risk and Control Monitoring Techniques
โ€ข Risk and Control Reporting Techniques (heatmap, scorecards, dashboards)
โ€ข Key Performance Indicators
โ€ข Key Risk Indicators (KRIs)
โ€ข Key Control Indicators (KCIs)
w w w . i n f o s e c t r a i n . c o m
INFORMATION TECHNOLOGY AND SECURITY
22% DOMAIN 4
Aโ€”INFORMATION TECHNOLOGY PRINCIPLES
Bโ€”INFORMATION SECURITY PRINCIPLES
In this domain we interrogate the alignment of business practices with Risk Management and Information Security
frameworks and standards, as well as the development of a risk-aware culture and implementation of security
awareness training.
โ€ข Enterprise Architecture
โ€ข IT Operations Management (e.g., change management, IT assets, problems, incidents)
โ€ข Project Management
โ€ข Disaster Recovery Management (DRM)
โ€ข Data Lifecycle Management
โ€ข System Development Life Cycle (SDLC)
โ€ข Emerging Technologies
โ€ข Information Security Concepts, Frameworks and Standards
โ€ข Information Security Awareness Training
โ€ข Business Continuity Management
โ€ข Data Privacy and Data Protection Principles
w w w . i n f o s e c t r a i n . c o m
www.infosectrain.com I sales@infosectrain.com

More Related Content

PDF
CISM Certification Course Content .pdf
PDF
CRISC_certification_training_course_content
PDF
CRISC_v1_2021_Course_Content & description
PDF
RISE's Training Catalog
DOCX
CRISC โ€“ Certified in Risk & Information Systems Control| Virtual and Classroom
PPTX
CRISC Course Preview
PDF
CRISC Domain 2 Control Environment Assessment in Risk Management.pdf
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
ย 
CISM Certification Course Content .pdf
CRISC_certification_training_course_content
CRISC_v1_2021_Course_Content & description
RISE's Training Catalog
CRISC โ€“ Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC Course Preview
CRISC Domain 2 Control Environment Assessment in Risk Management.pdf
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
ย 

Similar to CRISC Certification Course Content.pdf (20)

PDF
CRISC Domains Mind Map InfosecTrain .pdf
PDF
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
PDF
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
PDF
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
PDF
๐Œ๐š๐ฌ๐ญ๐ž๐ซ๐ข๐ง๐  ๐‚๐‘๐ˆ๐’๐‚ ๐ƒ๐จ๐ฆ๐š๐ข๐ง๐ฌ: ๐„๐ฅ๐ž๐ฏ๐š๐ญ๐ž ๐˜๐จ๐ฎ๐ซ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ๐†๐š๐ฆ๐ž!
PDF
A Major Revision of the CISRCP Program
PDF
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
ย 
PDF
CRSIC Domain 3 Risk Response and Mitigation
PDF
CRISC DOMAIN 3 RISK RESPONSE AND MITIGATION.pdf
PDF
CCISO_Certification_Training_Course-Outline.pdf
DOCX
DEPARTMENT CYBERSECURITY Whatโ€™s Your IT Risk Approa
PDF
CRISC Domain 4 Data Collection and Extraction Tools and Techniques
PDF
CRISC Domain 4 Data Collection and Extraction Tools and Techniques.pdf
PDF
CRISC Domain 4: Unlocking the Power of Data Collection & Extraction for Enhan...
PPTX
How To Become An IT Security Risk Analyst
PPTX
Risk - IT Services
PPTX
An Overview of IT Risk and Control
PDF
CISM Course Description CISM_Training_v2_Course_content.pdf
PDF
CISM Certification Training Course Content
DOCX
Chapter 1The International Information Systems Security Certifi.docx
CRISC Domains Mind Map InfosecTrain .pdf
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐Œ๐š๐ฌ๐ญ๐ž๐ซ๐ข๐ง๐  ๐‚๐‘๐ˆ๐’๐‚ ๐ƒ๐จ๐ฆ๐š๐ข๐ง๐ฌ: ๐„๐ฅ๐ž๐ฏ๐š๐ญ๐ž ๐˜๐จ๐ฎ๐ซ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ๐†๐š๐ฆ๐ž!
A Major Revision of the CISRCP Program
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
ย 
CRSIC Domain 3 Risk Response and Mitigation
CRISC DOMAIN 3 RISK RESPONSE AND MITIGATION.pdf
CCISO_Certification_Training_Course-Outline.pdf
DEPARTMENT CYBERSECURITY Whatโ€™s Your IT Risk Approa
CRISC Domain 4 Data Collection and Extraction Tools and Techniques
CRISC Domain 4 Data Collection and Extraction Tools and Techniques.pdf
CRISC Domain 4: Unlocking the Power of Data Collection & Extraction for Enhan...
How To Become An IT Security Risk Analyst
Risk - IT Services
An Overview of IT Risk and Control
CISM Course Description CISM_Training_v2_Course_content.pdf
CISM Certification Training Course Content
Chapter 1The International Information Systems Security Certifi.docx
Ad

More from infosec train (20)

PDF
CRISC 100 Days Study Plan InfosecTrain0.pdf
PDF
Red Team Expert_Interview Questions and Answers.pdf
PDF
Vulnerability Scanning with Nessus-A Practical Guide.pdf
PDF
CISA Revision material InfosecTrain .pdf
PDF
Black Widow s Stealth Mastering Ethical Hacking Techniques.pdf
PDF
GRC Analyst Interview Questions Infosec.pdf
PDF
OSI Model vs. TCPIP by InfosecTrain .pdf
PDF
Top 10 Network Security Solutions.pdf
PDF
Upcoming Free Webinar InfosecTrain.pdf
PDF
Advanced Cloud Security Governance.pdf
PDF
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
PDF
Internal Audit Interview Questions.pdf
PDF
ISO 22301 2019 Checklist InfosecTrain.pdf
PDF
Skill Switch Then vs Now InfosecTrain.pdf
PDF
Understanding CEH Module 3 Scanning Networks.pdf
PDF
CISA 100 Days Study Plan InfosecTrain.pdf
PDF
CISSP Exam Practice Questions & Answers.pdf
PDF
Achievers of the Month InfosecTrain .pdf
PDF
Jurassic World Rebirth Cybersecurity.pdf
PDF
CCSP Exam Practice Questions and Answers.pdf
CRISC 100 Days Study Plan InfosecTrain0.pdf
Red Team Expert_Interview Questions and Answers.pdf
Vulnerability Scanning with Nessus-A Practical Guide.pdf
CISA Revision material InfosecTrain .pdf
Black Widow s Stealth Mastering Ethical Hacking Techniques.pdf
GRC Analyst Interview Questions Infosec.pdf
OSI Model vs. TCPIP by InfosecTrain .pdf
Top 10 Network Security Solutions.pdf
Upcoming Free Webinar InfosecTrain.pdf
Advanced Cloud Security Governance.pdf
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
Internal Audit Interview Questions.pdf
ISO 22301 2019 Checklist InfosecTrain.pdf
Skill Switch Then vs Now InfosecTrain.pdf
Understanding CEH Module 3 Scanning Networks.pdf
CISA 100 Days Study Plan InfosecTrain.pdf
CISSP Exam Practice Questions & Answers.pdf
Achievers of the Month InfosecTrain .pdf
Jurassic World Rebirth Cybersecurity.pdf
CCSP Exam Practice Questions and Answers.pdf
Ad

Recently uploaded (20)

PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Trump Administration's workforce development strategy
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy โ€“ Electronic Transition...
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
1_English_Language_Set_2.pdf probationary
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Cell Types and Its function , kingdom of life
PDF
Empowerment Technology for Senior High School Guide
PDF
Complications of Minimal Access Surgery at WLH
PDF
Classroom Observation Tools for Teachers
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
ย 
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
Supply Chain Operations Speaking Notes -ICLT Program
Trump Administration's workforce development strategy
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy โ€“ Electronic Transition...
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Unit 4 Skeletal System.ppt.pptxopresentatiom
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Indian roads congress 037 - 2012 Flexible pavement
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Digestion and Absorption of Carbohydrates, Proteina and Fats
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
1_English_Language_Set_2.pdf probationary
A systematic review of self-coping strategies used by university students to ...
Cell Types and Its function , kingdom of life
Empowerment Technology for Senior High School Guide
Complications of Minimal Access Surgery at WLH
Classroom Observation Tools for Teachers
202450812 BayCHI UCSC-SV 20250812 v17.pptx
ย 
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

CRISC Certification Course Content.pdf

  • 1. w w w . i n f o s e c t r a i n . c o m W W W . I N F O S E C T R A I N . C O M
  • 2. w w w . i n f o s e c t r a i n . c o m CRISC Introduction Certified in Risk and Information System Control (CRISC) certification training program at Infosec Train is developed for those professionals who identify and manage the enterprise risks by implementing information system controls. The training will help you understand the impacts of IT risks and gain technical expertise in implementing proper information security controls to confront the challenges posed by these risks. CRISC is the most current and rigorous assessment available to evaluate IT professionalsโ€™ risk management proficiency and other employees within an enterprise or financial institute. Those who earn CRISC help enterprises understand business risks and have the technical knowledge to implement appropriate IS controls.
  • 3. w w w . i n f o s e c t r a i n . c o m CRISC Course Highlights 100% Money Back Guarantee Extended Post Training Not satisfied with your training on Day 1? You can get a refund or enroll in a different course. Get extended support even after you finish your training. Weโ€™re here for you until you reach your certification goals. 32-Hrs Instructor-led Training Accredited Instructors Telegram Discussion Group
  • 4. w w w . i n f o s e c t r a i n . c o m Who Should Attend CEOs/CFOs CIOs/CISOs Audit Partners/Heads Security Managers/ Directors/Consultants Chief Audit Executives Chief Compliance/ Privacy/Risk Officers CISM Exam Information Certification Certified in Risk and Information Systems Control Exam Duration 4 Hours Number of Questions 150 Exam Pattern Multiple Choice Passing Marks 450 out of 800 Languages English, French, German, Hebrew, Italian, Japanese, Korean, Spanish, Turkish, Chinese
  • 5. w w w . i n f o s e c t r a i n . c o m Happy Learners Across the World w w w . i n f o s e c t r a i n . c o m
  • 6. w w w . i n f o s e c t r a i n . c o m DOMAIN 1 GOVERNANCE 26% DOMAIN 2 IT RISK ASSESSMENT 20% DOMAIN 4 INFORMATION TECHNOLOGY AND SECURITY 20% CRISC Domains 32% DOMAIN 3 RISK RESPONSE AND REPORTING
  • 7. w w w . i n f o s e c t r a i n . c o m 26% DOMAIN 1 GOVERNANCE Aโ€”ORGANIZATIONAL GOVERNANCE Bโ€”RISK GOVERNANCE The governance domain interrogates your knowledge of information about an organizationโ€™s business and IT environments, organizational strategy, goals and objectives, and examines potential or realized impacts of IT risk to the organizationโ€™s business objectives and operations, including Enterprise Risk Management and Risk Management Framework. โ€ข Organizational Strategy, Goals, and Objectives โ€ข Organizational Structure, Roles and Responsibilities โ€ข Organizational Culture โ€ข Policies and Standards โ€ข Business Processes โ€ข Organizational Assets โ€ข Enterprise Risk Management and Risk Management Framework โ€ข Three Lines of Defense โ€ข Risk Profile โ€ข Risk Appetite and Risk Tolerance โ€ข Legal, Regulatory and Contractual Requirements โ€ข Professional Ethics of Risk Management
  • 8. w w w . i n f o s e c t r a i n . c o m 20% DOMAIN 2 IT RISK ASSESSMENT Aโ€”IT RISK IDENTIFICATION Bโ€”IT RISK ANALYSIS AND EVALUATION This domain will certify your knowledge of threats and vulnerabilities to the organizationโ€™s people, processes and technology as well as the likelihood and impact of threats, vulnerabilities and risk scenarios. โ€ข Risk Events (e.g., contributing conditions, loss result) โ€ข Threat Modelling and Threat Landscape โ€ข Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) โ€ข Risk Scenario Development โ€ข Risk Assessment Concepts, Standards and Frameworks โ€ข Risk Register โ€ข Risk Analysis Methodologies โ€ข Business Impact Analysis โ€ข Inherent and Residual Risk
  • 9. w w w . i n f o s e c t r a i n . c o m 32% DOMAIN 3 RISK RESPONSE AND REPORTING Aโ€”RISK RESPONSE Bโ€”CONTROL DESIGN AND IMPLEMENTATION Cโ€”RISK MONITORING AND REPORTING This domain deals with the development and management of risk treatment plans among key stakeholders, the evaluation of existing controls and improving effectiveness for IT risk mitigation, and the assessment of relevant risk and control information to applicable stakeholders. โ€ข Risk Treatment / Risk Response Options โ€ข Risk and Control Ownership โ€ข Third-Party Risk Management โ€ข Issue, Finding and Exception Management โ€ข Management of Emerging Risk โ€ข Control Types, Standards and Frameworks โ€ข Control Design, Selection and Analysis โ€ข Control Implementation โ€ข Control Testing and Effectiveness Evaluation โ€ข Risk Treatment Plans โ€ข Data Collection, Aggregation, Analysis and Validation โ€ข Risk and Control Monitoring Techniques โ€ข Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) โ€ข Key Performance Indicators โ€ข Key Risk Indicators (KRIs) โ€ข Key Control Indicators (KCIs)
  • 10. w w w . i n f o s e c t r a i n . c o m INFORMATION TECHNOLOGY AND SECURITY 22% DOMAIN 4 Aโ€”INFORMATION TECHNOLOGY PRINCIPLES Bโ€”INFORMATION SECURITY PRINCIPLES In this domain we interrogate the alignment of business practices with Risk Management and Information Security frameworks and standards, as well as the development of a risk-aware culture and implementation of security awareness training. โ€ข Enterprise Architecture โ€ข IT Operations Management (e.g., change management, IT assets, problems, incidents) โ€ข Project Management โ€ข Disaster Recovery Management (DRM) โ€ข Data Lifecycle Management โ€ข System Development Life Cycle (SDLC) โ€ข Emerging Technologies โ€ข Information Security Concepts, Frameworks and Standards โ€ข Information Security Awareness Training โ€ข Business Continuity Management โ€ข Data Privacy and Data Protection Principles
  • 11. w w w . i n f o s e c t r a i n . c o m www.infosectrain.com I sales@infosectrain.com