Tags
Language
Tags
September 2025
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Information Systems Risk Manager (Cisrm)

    Posted By: ELK1nG
    Certified Information Systems Risk Manager (Cisrm)

    Certified Information Systems Risk Manager (Cisrm)
    Last updated 11/2020
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.35 GB | Duration: 4h 6m

    Certification Course

    What you'll learn
    Perform Risk Tracking, Integration, and Implementation
    Understand the Benefits of Selecting Right KRIs
    Understand the Role of the CISRM in SDLC
    Understand the Methods for Describing IT Risk in Business Terms
    Articulate Risk, Manage Risk, React to Risk event
    Address Risk within the SDLC
    Requirements
    A background learning and practical experience in IT and IS will be required to actively participate and advance in this course.
    Description
    Do you have a burning desire to improve your information system risks technique? Then CISRM is the right choice as it is packed with such impactful topics as Risk Identification, Assessment, Evaluation, Response, Mentoring, and so much more.This course prepares you for the CISRM exam. For the duration of this course, participants will be exposed to knowledge-based training with relevant and equally advanced descriptions and illustrations of various information system risk-based elements, and how to overcome it all. There will also be practical cases to enhance your technique to becoming a management professional. Commence your journey into this next phase of action in your life and broaden your future career opportunity with CISRM. REGISTER NOW!

    Overview

    Section 1: Part I - The Big Picture: How Risk Management Relates to Risk Governance

    Lecture 1 The Big Picture: How Risk Management Relates to Risk Governance

    Lecture 2 About the C)ISRM Exam

    Lecture 3 Exam Relevance

    Lecture 4 About the C)ISRM Exam

    Lecture 5 C)ISRM Review Course

    Lecture 6 Section Overview

    Lecture 7 Part 1 Learning Objectives

    Section 2: Risk Management

    Lecture 8 Section Topics

    Lecture 9 Overview of Risk Management

    Lecture 10 Risk

    Lecture 11 Risk and Opportunity Management

    Lecture 12 Responsibility vs. Accountability

    Lecture 13 Responsibility vs. Accountability

    Lecture 14 Risk Management Roles and Responsibilities

    Section 3: Risk Management Frameworks, Standards and Practices

    Lecture 15 Relevance of Risk Management Frameworks, Standards and Practices

    Lecture 16 Frameworks

    Lecture 17 Standards

    Lecture 18 Practices

    Section 4: Essentials of Risk Governance

    Lecture 19 Relevance of Risk Governance

    Lecture 20 Overview of Risk Governance

    Lecture 21 Objectives of Risk Governance

    Lecture 22 Foundation of Risk Governance

    Lecture 23 Objectives of Risk Governance—cont.

    Lecture 24 Objectives of Risk Governance—cont.

    Lecture 25 Objectives of Risk Governance—cont.

    Section 5: Risk Appetite and Tolerance

    Lecture 26 Risk Appetite and Risk Tolerance

    Lecture 27 Risk Appetite and Risk Tolerance—cont.

    Lecture 28 Risk Appetite and Risk Tolerance—cont.

    Section 6: Risk Awareness and Communication

    Lecture 29 Risk Awareness and Communication

    Lecture 30 Risk Awareness and Communication—cont.

    Lecture 31 Risk Awareness and Communication—cont.

    Lecture 32 Key Concepts of Risk Governance

    Lecture 33 Key Concepts of Risk Governance

    Section 7: Risk Culture

    Lecture 34 Risk Culture—cont.

    Lecture 35 Risk Culture

    Section 8: Case Study & Practice Questions

    Lecture 36 Case Study

    Lecture 37 Practice Question 1

    Lecture 38 Practice Question 2

    Lecture 39 Practice Question 3

    Lecture 40 Practice Question 4

    Lecture 41 Practice Question 5

    Section 9: Definitions and Acronyms

    Lecture 42 Acronym Review

    Lecture 43 Definition Review

    Lecture 44 Definition Review

    Section 10: Supplemental Exercises

    Lecture 45 Big Picture Exercises

    Section 11: Suggested Resources for Further Study

    Lecture 46 Suggested Resources for Further Study

    Lecture 47 End of C)ISRM Part I - The Big Picture

    Section 12: Part II Domain 1 - Risk Identification, Assessment and Evaluation

    Lecture 48 Risk Identification, Assessment and Evaluation

    Lecture 49 Section Overview

    Lecture 50 Exam Relevance

    Lecture 51 Domain 1 Learning Objectives

    Lecture 52 Domain 1 Learning Objectives—cont.

    Section 13: Tasks and Knowledge Statements

    Lecture 53 Task Statements

    Lecture 54 Knowledge Statements

    Lecture 55 Knowledge Statements—cont.

    Lecture 56 Knowledge Statements

    Section 14: Risk Identification, Assessment and Evaluation

    Lecture 57 The Process

    Lecture 58 The Process—cont.

    Lecture 59 Describing the Business Impact of IT Risk

    Lecture 60 Describing the Business Impact of IT Risk

    Lecture 61 Describing the Business Impact of IT Risk

    Lecture 62 IT Risk in the Risk Hierarchy

    Lecture 63 IT Risk Categories

    Lecture 64 High Level Process Phases

    Section 15: Generic Risk Scenarios

    Lecture 65 Risk Scenarios

    Lecture 66 Definition of Risk Scenario

    Lecture 67 Event Types

    Lecture 68 Purpose of Risk Scenarios

    Section 16: Risk Scenario Development

    Lecture 69 Risk Scenario Development

    Lecture 70 Risk Scenario Development—cont.

    Lecture 71 Risk Scenario Development—cont.

    Lecture 72 Risk Register

    Lecture 73 Risk Profile

    Lecture 74 Risk Scenario Development

    Lecture 75 Risk Scenario Components

    Lecture 76 Risk Scenario Development

    Lecture 77 Risk Scenario Development—cont

    Lecture 78 Risk Scenario Development Enablers

    Lecture 79 Systemic, Contagious or Obscure Risk

    Lecture 80 Generic IT Risk Scenarios

    Lecture 81 Generic IT Risk Scenarios—cont.

    Section 17: Risk Factors

    Lecture 82 Definition of Risk Factor

    Lecture 83 Examples of Risk Factors

    Lecture 84 Risk Factors –-cont.

    Lecture 85 Risk Factors— External Environment

    Lecture 86 Risk Factors— External Environment—cont.

    Lecture 87 Risk Factors— Internal Environment

    Lecture 88 Risk Factors— Internal Environment

    Lecture 89 Risk Factors— Internal Environment

    Lecture 90 Risk Factors— Internal Environment

    Lecture 91 Risk Factors— Internal Environment—cont.

    Lecture 92 Risk Factors— Internal Environment—cont.

    Lecture 93 Risk Factors— Internal Environment—cont.

    Lecture 94 Risk Factors— Risk Management Capability

    Lecture 95 Risk Factors— IT Capability

    Lecture 96 Risk Factors— IT Related Business Capabilities

    Section 18: Risk Assessment Methods

    Lecture 97 Methods for Analyzing IT Risk

    Lecture 98 Likelihood and Impact

    Lecture 99 Risk Analysis Output

    Lecture 100 Risk Analysis Output

    Lecture 101 Risk Analysis Methods

    Lecture 102 Risk Analysis Methods— Quantitative

    Lecture 103 Risk Analysis Methods— Qualitative

    Lecture 104 Risk Analysis Methods— for HIGH impact risk types

    Lecture 105 Risk Analysis Methods

    Lecture 106 Risk Analysis Methods— Business Impact Analysis (BIA)

    Lecture 107 Methods for Assessing IT Risk

    Section 19: IT Risk Identification and Assessment

    Lecture 108 Identifying and Assessing IT Risk

    Lecture 109 Definitions

    Lecture 110 Adverse Impact of Risk Event

    Lecture 111 Business Impacts From IT Risk

    Lecture 112 Business Related IT Risk Types

    Lecture 113 IT Project-Related Risk

    Lecture 114 Risk Components— Inherent Risk

    Lecture 115 Risk Components— Residual Risk

    Lecture 116 Risk Components— Control Risk

    Lecture 117 Risk Components— Detection Risk

    Section 20: Business Risk and Threats Addressed By IT Resources

    Lecture 118 Business Risk and Threats Addressed By IT Resources

    Lecture 119 Identifying and Assessing IT Risk

    Lecture 120 Identifying and Assessing IT Risk

    Section 21: Methods For Describing IT Risk In Business Terms

    Lecture 121 Methods For Describing IT Risk In Business Terms

    Lecture 122 Methods For Describing IT Risk In Business Terms

    Lecture 123 Methods For Describing IT Risk In Business Terms

    Lecture 124 Methods For Describing IT Risk In Business Terms

    Lecture 125 Methods For Describing IT Risk In Business Terms

    Lecture 126 Methods For Describing IT Risk In Business Terms

    Lecture 127 Methods For Describing IT Risk In Business Terms

    Section 22: Case Study & Practice Questions

    Lecture 128 Case Study or Exercise

    Lecture 129 Practice Question 1

    Lecture 130 Practice Question 2

    Lecture 131 Practice Question 3

    Lecture 132 Practice Question 4

    Lecture 133 Practice Question 5

    Section 23: Definitions and Acronyms

    Lecture 134 Acronym Review

    Lecture 135 Acronym Review—cont.

    Lecture 136 Definition Review

    Lecture 137 Definition Review

    Lecture 138 Definition Review

    Lecture 139 Definition Review

    Section 24: Supplemental Exercises

    Lecture 140 Domain 1 – Exercises

    Section 25: Suggested Resources for Further Study

    Lecture 141 Suggested Resources for Further Study

    Lecture 142 End of C)ISRM Part II - Domain 1

    Section 26: Part II Domain 2 - Risk Response

    Lecture 143 Risk Response

    Lecture 144 Section Overview

    Lecture 145 Exam Relevance

    Lecture 146 Domain 2 Learning Objectives

    Lecture 147 Domain 2 Learning Objectives—cont

    Section 27: Tasks and Knowledge Statements

    Lecture 148 Task Statements

    Lecture 149 Knowledge Statements

    Section 28: Risk Response Process

    Lecture 150 Risk Response Objectives

    Lecture 151 The Risk Response Process

    Lecture 152 The Risk Response Process—cont.

    Lecture 153 The Risk Response Process—cont.

    Lecture 154 Risk Response Options

    Lecture 155 Risk Response Parameters

    Lecture 156 Risk Tolerance and Risk Response Options

    Lecture 157 Risk Response Prioritization Options

    Lecture 158 Risk Mitigation Control Types

    Lecture 159 Risk Response Prioritization Factors

    Lecture 160 Risk Response Tracking, Integration and Implementation

    Section 29: Risk Response Process Details

    Lecture 161 Process Phases

    Section 30: Phase 1 - Articulate Risk

    Lecture 162 Phase 1 - Articulate Risk

    Lecture 163 Phase 1 - Articulate Risk

    Lecture 164 Phase 1 - Articulate Risk

    Lecture 165 Phase 1 - Articulate Risk

    Lecture 166 Phase 1 - Articulate Risk

    Section 31: Phase 2 - Manage Risk

    Lecture 167 Phase 2 - Manage Risk

    Lecture 168 Phase 2 - Manage Risk

    Lecture 169 Phase 2 - Manage Risk

    Lecture 170 Phase 2 - Manage Risk

    Lecture 171 Phase 2 - Manage Risk

    Lecture 172 Phase 2 - Manage Risk

    Section 32: Phase 3 - React To Risk Events

    Lecture 173 Phase 3 - React To Risk Events

    Lecture 174 Phase 3 - React To Risk Events

    Lecture 175 Phase 3 - React To Risk Events

    Lecture 176 Phase 3 - React To Risk Events

    Lecture 177 Phase 3 - React To Risk Events

    Section 33: Risk Response and Risk Management Frameworks

    Lecture 178 Risk Management Frameworks

    Lecture 179 Risk Management Frameworks

    Lecture 180 Risk Management Frameworks

    Lecture 181 Risk Management Frameworks

    Lecture 182 Risk Management Frameworks

    Lecture 183 Risk Management Frameworks

    Section 34: Case Study and Practice Questions

    Lecture 184 Sample Case Study or Exercise

    Lecture 185 Practice Question 1

    Lecture 186 Practice Question 2

    Lecture 187 Practice Question 3

    Lecture 188 Practice Question 4

    Lecture 189 Practice Question 5

    Section 35: Definitions and Acronyms

    Lecture 190 Acronym Review

    Lecture 191 Definition Review

    Section 36: Supplemental Exercises

    Lecture 192 Domain 2 – Exercises

    Section 37: Suggested Resources for Further Study

    Lecture 193 Suggested Resources for Further Study

    Lecture 194 End of C)ISRM Part II - Domain 2

    Section 38: Part II Domain 3 - Risk Monitoring

    Lecture 195 Risk Monitoring

    Lecture 196 Course Agenda

    Lecture 197 Exam Relevance

    Lecture 198 Learning Objectives

    Lecture 199 Learning Objectives Cont.

    Section 39: Tasks and Knowledge Statements

    Lecture 200 Task Statements

    Lecture 201 Knowledge Statements

    Section 40: Essentials of Risk Monitoring

    Lecture 202 Essentials

    Section 41: Key Risk Indicators

    Lecture 203 Risk Indicators

    Lecture 204 Risk Indicator Selection Criteria

    Lecture 205 Key Risk Indicators

    Lecture 206 Risk Monitoring

    Lecture 207 Risk Indicator Types and Parameters

    Lecture 208 Risk Indicator Considerations

    Lecture 209 Risk Indicator Considerations Con’t

    Lecture 210 Criteria for KRI Selection

    Lecture 211 Benefits of Selecting Right KRIs

    Lecture 212 Benefits of Selecting Right KRIs

    Lecture 213 Disadvantages of Wrong KRIs

    Lecture 214 Changing KRIs

    Lecture 215 KPIs

    Lecture 216 KPIs

    Lecture 217 KPIs

    Section 42: Data Extraction, Aggregation, & Analysis

    Lecture 218 Gathering KRI Data

    Lecture 219 Steps to Data Gathering

    Lecture 220 Gathering Requirements

    Lecture 221 Data Access

    Lecture 222 Data Preparation

    Lecture 223 Data Validating Considerations

    Lecture 224 Data Analysis

    Lecture 225 Reporting and Corrective Actions

    Lecture 226 Optimizing KRIs

    Lecture 227 Optimizing KRIs—cont.

    Section 43: Capability Maturity Models

    Lecture 228 Use of Maturity Level Assessment

    Lecture 229 Assessing Risk Maturity Levels

    Lecture 230 Risk Management Capability Maturity Levels

    Section 44: Changes to Threats, Vulnerabilities and Assets

    Lecture 231 Changing Threat Levels

    Lecture 232 Monitoring Changes in Threat Levels

    Lecture 233 Measuring Changes in Threat Levels

    Lecture 234 Responding to Changes in Threat Levels

    Lecture 235 Threat Level Review

    Lecture 236 Changes in Asset Value

    Lecture 237 Maintain Asset Inventory

    Section 45: Risk Reporting

    Lecture 238 Risk Reporting

    Lecture 239 Reporting Content

    Lecture 240 Effective Reports

    Lecture 241 Report Recommendations

    Lecture 242 Possible Risk Report Recipients

    Lecture 243 Periodic Reporting

    Lecture 244 Reporting Topics

    Lecture 245 Risk Reporting Techniques

    Section 46: Case Study & Practice Questions

    Lecture 246 Sample Case Study or Exercise

    Lecture 247 Practice Question 1

    Lecture 248 Practice Question 2

    Lecture 249 Practice Question 3

    Lecture 250 Practice Question 4

    Section 47: Definitions and Acronyms

    Lecture 251 Acronym Review

    Lecture 252 Definition Review

    Lecture 253 Domain 3 – Exercises

    Section 48: Suggested Resources for Further Study

    Lecture 254 Suggested Resources for Further Study

    Lecture 255 End of C)ISRM Part II - Domain 3

    Section 49: Part II Domain 4 - Information Systems Control Design and Implementation

    Lecture 256 Information Systems Control Design and Implementation

    Lecture 257 Section Overview

    Lecture 258 Exam Relevance

    Lecture 259 Domain 4 Learning Objectives

    Section 50: Tasks and Knowledge Statements

    Lecture 260 Task Statements

    Lecture 261 Task Statements

    Lecture 262 Knowledge Statements

    Lecture 263 Knowledge Statements

    Section 51: Control Design Considerations

    Lecture 264 C)ISRM Involvement

    Lecture 265 C)ISRM involvement—cont.

    Lecture 266 Control Definition

    Lecture 267 Control Categories

    Lecture 268 Control Types and Effects

    Lecture 269 Control Methods

    Lecture 270 Control Design Considerations

    Lecture 271 Control Strength

    Lecture 272 Control Strength

    Lecture 273 Control Costs and Benefits

    Lecture 274 Potential Loss Measures

    Lecture 275 Total Cost of Ownership For Controls

    Section 52: System Development Life Cycle (SDLC)

    Lecture 276 Role of the C)ISRM in SDLC

    Lecture 277 Role of the C)ISRM in SDLC

    Lecture 278 Role of the C)ISRM in SDLC

    Lecture 279 The SDLC Process

    Lecture 280 The Systems Development Life Cycle (SDLC)

    Lecture 281 ‘Meets and Continues to Meet’

    Lecture 282 SDLC

    Lecture 283 SDLC Phases

    Lecture 284 Addressing Risk Within the SDLC

    Lecture 285 Business Risk versus Project Risk

    Lecture 286 Understanding Project Risk

    Lecture 287 Addressing Business Risk

    Lecture 288 Understanding Business and Risk Requirements

    Lecture 289 Understand Business Risk

    Section 53: System Development Life Cycle (SDLC) Phases

    Lecture 290 High Level SDLC Phases

    Section 54: 1. Project Initiation (and Requirements Definition)

    Lecture 291 Project Initiation

    Lecture 292 Phase 1 – Project Initiation

    Lecture 293 Phase 1 Tasks

    Lecture 294 Task 1—Feasibility Study

    Lecture 295 Feasibility Study Components

    Lecture 296 Determining Feasibility

    Lecture 297 Outcomes of the Feasibility Study

    Lecture 298 Task 2—Define Requirement

    Lecture 299 Requirement Progression

    Lecture 300 Business Information Requirements (COBIT)

    Lecture 301 Requirements Success Factors

    Lecture 302 Task 3—Acquire Software “Options”

    Lecture 303 Software Selection Criteria

    Lecture 304 Software Acquisition

    Lecture 305 Software Acquisition Process

    Section 55: 2. Project Design and Development

    Lecture 306 Leading Principles for Design and Implementation

    Lecture 307 C)ISRM Responsibilities

    Lecture 308 Key System Design Activities:

    Lecture 309 Key System Design Activities—cont.

    Lecture 310 Steps to Perform Phase 2

    Lecture 311 Phase 2 - Project Design and Development

    Section 56: 3. Project Testing

    Lecture 312 System Testing

    Lecture 313 Test Plans

    Lecture 314 Project Testing

    Lecture 315 Types of Tests

    Lecture 316 UAT Requirements

    Lecture 317 Certification and Accreditation

    Lecture 318 Project Status Reports

    Lecture 319 Phase 3 - Project Testing

    Lecture 320 Testing Techniques

    Lecture 321 Alpha Testing

    Lecture 322 Beta Testing

    Lecture 323 Function Validation

    Lecture 324 Parallel Testing

    Lecture 325 Pilot Testing

    Lecture 326 Regression Testing

    Lecture 327 Sociability Testing

    Lecture 328 White Box Testing

    Lecture 329 Verification and Validation

    Section 57: 4. Project Implementation

    Lecture 330 Phase 4 - Project Implementation

    Lecture 331 Project Implementation

    Lecture 332 Implementation Phases

    Lecture 333 Phase 4 - Project Implementation

    Lecture 334 End User Training Plans & Techniques

    Lecture 335 Training Strategy

    Lecture 336 Data Migration/Conversion Considerations

    Lecture 337 Risks During Data Migration

    Lecture 338 Data Conversion Steps

    Lecture 339 Implementation Rollback

    Lecture 340 Data Conversion Project Key Considerations

    Lecture 341 Changeover Techniques

    Lecture 342 Post-Implementation Review

    Lecture 343 Performing Post-Implementation Review

    Lecture 344 Measurements of Critical Success Factors

    Lecture 345 Closing a Project

    Section 58: Project Management and Controlling

    Lecture 346 Project Management and Controlling

    Section 59: Project Management Practices

    Lecture 347 Project Management Tools and Techniques

    Lecture 348 Project Management Elements

    Lecture 349 Project Management Practices

    Lecture 350 PERT chart and critical path

    Lecture 351 PERT Attribute

    Section 60: Case Study & Practice Questions

    Lecture 352 Sample Case Study or Exercise

    Lecture 353 Practice Question 1

    Lecture 354 Practice Question 2

    Lecture 355 Practice Question 3

    Lecture 356 Practice Question 4

    Lecture 357 Practice Question 5

    Section 61: Definitions and Acronyms

    Lecture 358 Acronym Review

    Lecture 359 Definition Review

    Lecture 360 Domain 4 – Exercises

    Section 62: Suggested Resources for Further Study

    Lecture 361 Suggested Resources for Further Study

    Lecture 362 End of C)ISRM Part II - Domain 4

    Students with an IT and IS learning background, wanting to adequately advance in skill and knowledge, as related to information system risk. This course is majorly for:,Individuals preparing for CISRM certification exam,Individuals seeking to learn Risk Management at a professional level