Certified Risk And Information System Control (Crisc-Isaca)

Posted By: ELK1nG

Certified Risk And Information System Control (Crisc-Isaca)
Last updated 3/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.57 GB | Duration: 14h 1m

CRISC with Hemang Doshi (New Course -2021)

What you'll learn
ISACA CRISC Lectures
Contains all the 4 Domains of CRISC Review Manual
Requirements
Not Applicable
Description
This course is aligned with ISACA's CRISC Review Manual - 7th Edition (2021). Please note that objective of this course is to support and supplement the content of the ISACA's official resources. This course is not meant to replace CRISC Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA's official resource as prime resource to study for CRISC exam. This course will help you to decipher the technicities used in official resources. This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CRISC Review Manual. Topics are arranged segment wise and aligned with latest CRISC Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CRISC Review Manual  in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.CRISC  by Hemang DoshiFeatures of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CRISC Review Manual. Exam oriented practice questions and practical example for CRISC aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 500 plus practice questions Course also includes 2 full CRISC Mock Test (150 questions each)

Overview

Section 1: Chapter 1 - Governance

Lecture 1 1.1.1A Meaning of Risk

Lecture 2 1.1.0 ISACA's Thinking Hat

Lecture 3 1.1.1B CIA Principles

Lecture 4 1.1.1C IS Risks & Other Concepts

Lecture 5 1.1.2 - Organization Goals, Objectives and Strategies

Lecture 6 1.1.2 - Key Aspects - Organization Goals, Objectives and Strategy

Lecture 7 QAE - Organization Goals. Objectives and Strategy

Lecture 8 1.1.3 IT Risk Strategy of the Business

Lecture 9 1.1.4A Enterprise Risk Management Framework

Lecture 10 1.1.4B IT Steering Committee

Lecture 11 1.1.4C Aligning Risk Response with Business Objectives

Lecture 12 1.1.5 IT related Business Risks

Lecture 13 1.1.6 IT Concept and Areas of Concerns for Risk Practitioner

Lecture 14 1.2.2 Roles in Risk Management - RACI

Lecture 15 1.3 Risk Culture and Communication

Lecture 16 1.4 Policy, Guidelines and Standards

Lecture 17 1.4A QAE - Policy, Guidelines and Standards

Lecture 18 1.5 Business Process Review

Lecture 19 1.6.2 Elements of Risk

Lecture 20 1.8 Three Lines of Defense

Lecture 21 1.10A Risk Capacity, Risk Appetite and Risk Tolerance

Lecture 22 1.10B Key Aspects - Risk Capacity, Risk Appetite and Risk Tolerance

Lecture 23 1.10C QAE - Risk Capacity, Risk Appetite and Risk Tolerance

Section 2: Chapter 2 - IT Risk Assessment

Lecture 24 2.1.2A Method of Risk Identification

Lecture 25 2.1.2B Key Aspects - Method of Risk Identification

Lecture 26 2.1.2C QAE - Method of Risk Identification

Lecture 27 2.4A IT Risk Scenarios

Lecture 28 2.4B Key Aspects - IT Risk Scenarios

Lecture 29 2.4C QAE - IT Risk Scenarios

Lecture 30 2.4D Analyzing the Risk Scenarios

Lecture 31 2.4E QAE - Analyzing the Risk Scenarios

Lecture 32 2..5.1A Risk Assessment

Lecture 33 2.5.1B QAE - Risk Assessment

Lecture 34 2.5.2 Risk Assessment Techniques

Lecture 35 2.5.2 Risk Ranking

Lecture 36 2.5.3 Risk Management Procedures and Documentations

Lecture 37 2.6 IT Risk Register

Lecture 38 2.7 Risk Analysis Methodologies

Lecture 39 2.9 Inherent, Residual, Control Risk

Lecture 40 2.10 Current State of Controls

Lecture 41 2.11 Change in Risk Environment

Lecture 42 2.12 Risk & Control Analysis

Section 3: Chapter 3 -Risk Response & Reporting

Lecture 43 3.1 Risk Ownership and Accountability

Lecture 44 3.2.1 Risk Treatment Options

Lecture 45 3.2.2 Analysis Techniques for selecting risk response

Lecture 46 3.3 Third Party Risk Management

Lecture 47 3.6AManagerial, Technical & Physical Controls

Lecture 48 3.6B Preventive, Detective and Corrective Controls

Lecture 49 3.7 Control Design & Implementation

Lecture 50 3.8.2 Post Implementation Review

Lecture 51 3.9.1 Control Testing and Effectiveness Evaluation

Lecture 52 3.9.2 System Testing

Lecture 53 3.9.3 Vulnerabilities associated with new controls

Lecture 54 3.10 Developing a Risk Action Plan

Lecture 55 3.11 Data collection and extraction tools and techniques

Lecture 56 3.12.1 Risk and control monitoring techniques

Lecture 57 3.12.2 Control Assessment Types

Lecture 58 3.12.3 Results of Control Assessments

Lecture 59 3.14 Key Performance Indicators

Lecture 60 3.15.1 Key Risk Indicators

Lecture 61 3.15.2 Lag vis-a-vis Lead Indicators

Lecture 62 3.16 Key Control Indicators

Lecture 63 3.16.1 Differentiating KPI, KRI and KCI

Lecture 64 3.17 Changes to the IT Risk Profile

Lecture 65 3.18 Control Ownership

Section 4: Chapter 4 - Information Technology and Security

Lecture 66 4.1.1 Enterprise Architecture

Lecture 67 4.1.2 Security Architecture

Lecture 68 4.1.3 Maturity Models

Lecture 69 4.2.1 OSI layers

Lecture 70 4.2.2 TCP / IP

Lecture 71 4.2.3 Network Cabling

Lecture 72 4.2.4 Network Devices

Lecture 73 4.2.5 Types of firewalls

Lecture 74 4.2.6 Demilitarized Zone (DMZ)

Lecture 75 4.2.7 Proxy Server

Lecture 76 4.2.8 Firewall Implementation

Lecture 77 4.2.9 Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)

Lecture 78 4.2.9A Key Aspects - Intrusion Detection System and Intrusion Prevention System

Lecture 79 4.2.10 Domain Name System

Lecture 80 4.2.11 Wireless Access Point

Lecture 81 4.2.13 Virtual Private Network (VPN)

Lecture 82 4.2.14 Cloud computing

Lecture 83 4.3.1 Project & Program Management

Lecture 84 4.3.2 - Phases of SDLC

Lecture 85 4.3.3 System Migration & Changeover Techniques

Lecture 86 4.4.1 - Enterprise Resiliency (BCP & BIA)

Lecture 87 4.4.2 Recovery Objectives

Lecture 88 4.4.3 Incident Response Plan and Procedures

Lecture 89 4.5.1 Data Classification

Lecture 90 4.5 Data Life Cycle Management

Lecture 91 4.6.2 System Accreditation and Certification

Lecture 92 4.6.3 Online Auditing Techniques

Lecture 93 4.7.1 Emerging and New Technologies

Lecture 94 4.7.2 Deepfakes

Lecture 95 4.7.3 Internet of Things

Lecture 96 4.7.4 BlockChain

Lecture 97 4.7.5 Information Security Principles

Lecture 98 4.8.1 Segregation of duties, Cross training and Job rotation

Lecture 99 4.8.1A Segregation of Duties

Lecture 100 4.8.2 Factor of Authentication

Lecture 101 4.8.3 Password Management

Lecture 102 4.8.4 Biometrics

Lecture 103 4.8.6 Asymmetric Encryption

Lecture 104 4.8.7 Digital Signature

Lecture 105 4.8.8 Public Key Infrastructure (PKI)

Lecture 106 4.9 Information Security Awareness Training

Lecture 107 4.10 Data Privacy

Lecture 108 4.11 Different Attack Methods

Section 5: CRISC Mock Test

Risk Manager, IT Manager, Auditor,IT Auditor, IT Risk Practitioner