Certified in Risk and Information Systems Control Video Course

CRISC: Certified in Risk and Information Systems Control

Your Isaca CRISC exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CRISC certification test. Ace your Isaca CRISC at the first attempt and obtain the Certified in Risk and Information Systems Control credential with ease.

# of Students
94
# of Lectures
64
Course Length
3 h
Course Rating
4.4
Price $27.49
Today $24.99

Curriculum for CRISC Video Course

Introduction to Risk Management

  Video Name Time
  1. Module Overview 2:00
  2. Why study risk management? 7:00
  3. What is IT for? 5:00
  4. What does IT Governance help the company to understand? 4:00
  5. What does IT Governance enable the enterprise to achieve? 3:00
  6. Governance - General Topics 3:00
  7. What is risk? 5:00
  8. What are the main objectives of Risk Governance? 4:00
  9. How do you know how much to spend to respond to a risk? 2:00
  10. How to know in which control mechanisms should the company invest? 4:00
  11. What is IT Risk Management? 2:00
  12. What are the characteristics of a risk management program? 6:00
  13. Key Points 5:00
  14. Thank You! 1:00
  Video Name Time
  1. Module Overview 2:00
  2. What does "IT Risk Identification" mean? 4:00
  3. What is the difference between risk capacity, appetite and tolerance? 6:00
  4. What is a company's "risk culture"? 6:00
  5. How to carry out the correct communication of risks? 4:00
  6. What are the elements that make up a risk? 4:00
  7. What is the terminology for identifying risks? 6:00
  8. What are "risk factors"? 4:00
  9. What are the main public sources of vulnerabilities? 1:00
  10. What is a "vulnerability assessment"? 3:00
  11. What are the key principles for information security risks? 5:00
  12. How can the risk professional avoid being seen as obstructive? 3:00
  13. What are the roles involved in the risk management process? 4:00
  14. What are the methods of identifying risks? 2:00
  15. What is the risk identification process? 2:00
  16. What is a "risk scenario"? 4:00
  17. What is the risk register? 2:00
  18. What are risk awareness programs? 2:00
  19. Key Points 6:00
  20. Thank you! 1:00
  Video Name Time
  1. Module Overview 2:00
  2. But after all, what has not yet been done in identifying risks? 4:00
  3. What are the techniques used to assess IT risks? 2:00
  4. What are the factors that affect the calculation of risk assessment? 7:00
  5. What are the types of security controls? 4:00
  6. How to check the current state of security controls? 5:00
  7. What other sources of risk should be evaluated? 3:00
  8. How is IT risk assessment done? 3:00
  9. What are the methodologies for risk assessment? 3:00
  10. How is risk classification performed? 3:00
  11. Key Points 5:00
  12. Thank You! 1:00
  Video Name Time
  1. Module Overview 1:00
  2. Is not it just eliminating all the identified risks? 3:00
  3. What are the options for responding to risks? 7:00
  4. What are the key techniques for determining the best response to risks? 4:00
  5. What are the types of risks? 3:00
  6. Key Points 3:00
  7. Thank You! 2:00
  Video Name Time
  1. Module Overview 2:00
  2. What are Key Risk Indicators? 4:00
  3. What are the benefits of KRIs? 2:00
  4. What are key performance indicators? 3:00
  5. What data sources can be used for risk monitoring and reporting? 7:00
  6. What are the types of assessments of safety controls and risks? 4:00
  7. Key Points 3:00
  8. Thank You! 3:00
  Video Name Time
  1. Module Overview 1:00
  2. Requirements 5:00
  3. About the Test 4:00

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.4
Rating: 4.4
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Databricks
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Oracle
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Isaca
Next Step
Next Step