Certified Risk And Information System Control (Crisc-Isaca)
Last updated 3/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.57 GB | Duration: 14h 1m
Last updated 3/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.57 GB | Duration: 14h 1m
CRISC with Hemang Doshi (New Course -2021)
What you'll learn
ISACA CRISC Lectures
Contains all the 4 Domains of CRISC Review Manual
Requirements
Not Applicable
Description
This course is aligned with ISACA's CRISC Review Manual - 7th Edition (2021). Please note that objective of this course is to support and supplement the content of the ISACA's official resources. This course is not meant to replace CRISC Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA's official resource as prime resource to study for CRISC exam. This course will help you to decipher the technicities used in official resources. This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CRISC Review Manual. Topics are arranged segment wise and aligned with latest CRISC Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CRISC Review Manual in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.CRISC by Hemang DoshiFeatures of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CRISC Review Manual. Exam oriented practice questions and practical example for CRISC aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 500 plus practice questions Course also includes 2 full CRISC Mock Test (150 questions each)
Overview
Section 1: Chapter 1 - Governance
Lecture 1 1.1.1A Meaning of Risk
Lecture 2 1.1.0 ISACA's Thinking Hat
Lecture 3 1.1.1B CIA Principles
Lecture 4 1.1.1C IS Risks & Other Concepts
Lecture 5 1.1.2 - Organization Goals, Objectives and Strategies
Lecture 6 1.1.2 - Key Aspects - Organization Goals, Objectives and Strategy
Lecture 7 QAE - Organization Goals. Objectives and Strategy
Lecture 8 1.1.3 IT Risk Strategy of the Business
Lecture 9 1.1.4A Enterprise Risk Management Framework
Lecture 10 1.1.4B IT Steering Committee
Lecture 11 1.1.4C Aligning Risk Response with Business Objectives
Lecture 12 1.1.5 IT related Business Risks
Lecture 13 1.1.6 IT Concept and Areas of Concerns for Risk Practitioner
Lecture 14 1.2.2 Roles in Risk Management - RACI
Lecture 15 1.3 Risk Culture and Communication
Lecture 16 1.4 Policy, Guidelines and Standards
Lecture 17 1.4A QAE - Policy, Guidelines and Standards
Lecture 18 1.5 Business Process Review
Lecture 19 1.6.2 Elements of Risk
Lecture 20 1.8 Three Lines of Defense
Lecture 21 1.10A Risk Capacity, Risk Appetite and Risk Tolerance
Lecture 22 1.10B Key Aspects - Risk Capacity, Risk Appetite and Risk Tolerance
Lecture 23 1.10C QAE - Risk Capacity, Risk Appetite and Risk Tolerance
Section 2: Chapter 2 - IT Risk Assessment
Lecture 24 2.1.2A Method of Risk Identification
Lecture 25 2.1.2B Key Aspects - Method of Risk Identification
Lecture 26 2.1.2C QAE - Method of Risk Identification
Lecture 27 2.4A IT Risk Scenarios
Lecture 28 2.4B Key Aspects - IT Risk Scenarios
Lecture 29 2.4C QAE - IT Risk Scenarios
Lecture 30 2.4D Analyzing the Risk Scenarios
Lecture 31 2.4E QAE - Analyzing the Risk Scenarios
Lecture 32 2..5.1A Risk Assessment
Lecture 33 2.5.1B QAE - Risk Assessment
Lecture 34 2.5.2 Risk Assessment Techniques
Lecture 35 2.5.2 Risk Ranking
Lecture 36 2.5.3 Risk Management Procedures and Documentations
Lecture 37 2.6 IT Risk Register
Lecture 38 2.7 Risk Analysis Methodologies
Lecture 39 2.9 Inherent, Residual, Control Risk
Lecture 40 2.10 Current State of Controls
Lecture 41 2.11 Change in Risk Environment
Lecture 42 2.12 Risk & Control Analysis
Section 3: Chapter 3 -Risk Response & Reporting
Lecture 43 3.1 Risk Ownership and Accountability
Lecture 44 3.2.1 Risk Treatment Options
Lecture 45 3.2.2 Analysis Techniques for selecting risk response
Lecture 46 3.3 Third Party Risk Management
Lecture 47 3.6AManagerial, Technical & Physical Controls
Lecture 48 3.6B Preventive, Detective and Corrective Controls
Lecture 49 3.7 Control Design & Implementation
Lecture 50 3.8.2 Post Implementation Review
Lecture 51 3.9.1 Control Testing and Effectiveness Evaluation
Lecture 52 3.9.2 System Testing
Lecture 53 3.9.3 Vulnerabilities associated with new controls
Lecture 54 3.10 Developing a Risk Action Plan
Lecture 55 3.11 Data collection and extraction tools and techniques
Lecture 56 3.12.1 Risk and control monitoring techniques
Lecture 57 3.12.2 Control Assessment Types
Lecture 58 3.12.3 Results of Control Assessments
Lecture 59 3.14 Key Performance Indicators
Lecture 60 3.15.1 Key Risk Indicators
Lecture 61 3.15.2 Lag vis-a-vis Lead Indicators
Lecture 62 3.16 Key Control Indicators
Lecture 63 3.16.1 Differentiating KPI, KRI and KCI
Lecture 64 3.17 Changes to the IT Risk Profile
Lecture 65 3.18 Control Ownership
Section 4: Chapter 4 - Information Technology and Security
Lecture 66 4.1.1 Enterprise Architecture
Lecture 67 4.1.2 Security Architecture
Lecture 68 4.1.3 Maturity Models
Lecture 69 4.2.1 OSI layers
Lecture 70 4.2.2 TCP / IP
Lecture 71 4.2.3 Network Cabling
Lecture 72 4.2.4 Network Devices
Lecture 73 4.2.5 Types of firewalls
Lecture 74 4.2.6 Demilitarized Zone (DMZ)
Lecture 75 4.2.7 Proxy Server
Lecture 76 4.2.8 Firewall Implementation
Lecture 77 4.2.9 Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
Lecture 78 4.2.9A Key Aspects - Intrusion Detection System and Intrusion Prevention System
Lecture 79 4.2.10 Domain Name System
Lecture 80 4.2.11 Wireless Access Point
Lecture 81 4.2.13 Virtual Private Network (VPN)
Lecture 82 4.2.14 Cloud computing
Lecture 83 4.3.1 Project & Program Management
Lecture 84 4.3.2 - Phases of SDLC
Lecture 85 4.3.3 System Migration & Changeover Techniques
Lecture 86 4.4.1 - Enterprise Resiliency (BCP & BIA)
Lecture 87 4.4.2 Recovery Objectives
Lecture 88 4.4.3 Incident Response Plan and Procedures
Lecture 89 4.5.1 Data Classification
Lecture 90 4.5 Data Life Cycle Management
Lecture 91 4.6.2 System Accreditation and Certification
Lecture 92 4.6.3 Online Auditing Techniques
Lecture 93 4.7.1 Emerging and New Technologies
Lecture 94 4.7.2 Deepfakes
Lecture 95 4.7.3 Internet of Things
Lecture 96 4.7.4 BlockChain
Lecture 97 4.7.5 Information Security Principles
Lecture 98 4.8.1 Segregation of duties, Cross training and Job rotation
Lecture 99 4.8.1A Segregation of Duties
Lecture 100 4.8.2 Factor of Authentication
Lecture 101 4.8.3 Password Management
Lecture 102 4.8.4 Biometrics
Lecture 103 4.8.6 Asymmetric Encryption
Lecture 104 4.8.7 Digital Signature
Lecture 105 4.8.8 Public Key Infrastructure (PKI)
Lecture 106 4.9 Information Security Awareness Training
Lecture 107 4.10 Data Privacy
Lecture 108 4.11 Different Attack Methods
Section 5: CRISC Mock Test
Risk Manager, IT Manager, Auditor,IT Auditor, IT Risk Practitioner