Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Risk And Information System Control (Crisc-Isaca)

    Posted By: ELK1nG
    Certified Risk And Information System Control (Crisc-Isaca)

    Certified Risk And Information System Control (Crisc-Isaca)
    Last updated 3/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.57 GB | Duration: 14h 1m

    CRISC with Hemang Doshi (New Course -2021)

    What you'll learn
    ISACA CRISC Lectures
    Contains all the 4 Domains of CRISC Review Manual
    Requirements
    Not Applicable
    Description
    This course is aligned with ISACA's CRISC Review Manual - 7th Edition (2021). Please note that objective of this course is to support and supplement the content of the ISACA's official resources. This course is not meant to replace CRISC Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA's official resource as prime resource to study for CRISC exam. This course will help you to decipher the technicities used in official resources. This course is designed on the basis of official resources of ISACA. It covers all the 4 domains of CRISC Review Manual. Topics are arranged segment wise and aligned with latest CRISC Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CRISC Review Manual  in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.CRISC  by Hemang DoshiFeatures of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CRISC Review Manual. Exam oriented practice questions and practical example for CRISC aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 500 plus practice questions Course also includes 2 full CRISC Mock Test (150 questions each)

    Overview

    Section 1: Chapter 1 - Governance

    Lecture 1 1.1.1A Meaning of Risk

    Lecture 2 1.1.0 ISACA's Thinking Hat

    Lecture 3 1.1.1B CIA Principles

    Lecture 4 1.1.1C IS Risks & Other Concepts

    Lecture 5 1.1.2 - Organization Goals, Objectives and Strategies

    Lecture 6 1.1.2 - Key Aspects - Organization Goals, Objectives and Strategy

    Lecture 7 QAE - Organization Goals. Objectives and Strategy

    Lecture 8 1.1.3 IT Risk Strategy of the Business

    Lecture 9 1.1.4A Enterprise Risk Management Framework

    Lecture 10 1.1.4B IT Steering Committee

    Lecture 11 1.1.4C Aligning Risk Response with Business Objectives

    Lecture 12 1.1.5 IT related Business Risks

    Lecture 13 1.1.6 IT Concept and Areas of Concerns for Risk Practitioner

    Lecture 14 1.2.2 Roles in Risk Management - RACI

    Lecture 15 1.3 Risk Culture and Communication

    Lecture 16 1.4 Policy, Guidelines and Standards

    Lecture 17 1.4A QAE - Policy, Guidelines and Standards

    Lecture 18 1.5 Business Process Review

    Lecture 19 1.6.2 Elements of Risk

    Lecture 20 1.8 Three Lines of Defense

    Lecture 21 1.10A Risk Capacity, Risk Appetite and Risk Tolerance

    Lecture 22 1.10B Key Aspects - Risk Capacity, Risk Appetite and Risk Tolerance

    Lecture 23 1.10C QAE - Risk Capacity, Risk Appetite and Risk Tolerance

    Section 2: Chapter 2 - IT Risk Assessment

    Lecture 24 2.1.2A Method of Risk Identification

    Lecture 25 2.1.2B Key Aspects - Method of Risk Identification

    Lecture 26 2.1.2C QAE - Method of Risk Identification

    Lecture 27 2.4A IT Risk Scenarios

    Lecture 28 2.4B Key Aspects - IT Risk Scenarios

    Lecture 29 2.4C QAE - IT Risk Scenarios

    Lecture 30 2.4D Analyzing the Risk Scenarios

    Lecture 31 2.4E QAE - Analyzing the Risk Scenarios

    Lecture 32 2..5.1A Risk Assessment

    Lecture 33 2.5.1B QAE - Risk Assessment

    Lecture 34 2.5.2 Risk Assessment Techniques

    Lecture 35 2.5.2 Risk Ranking

    Lecture 36 2.5.3 Risk Management Procedures and Documentations

    Lecture 37 2.6 IT Risk Register

    Lecture 38 2.7 Risk Analysis Methodologies

    Lecture 39 2.9 Inherent, Residual, Control Risk

    Lecture 40 2.10 Current State of Controls

    Lecture 41 2.11 Change in Risk Environment

    Lecture 42 2.12 Risk & Control Analysis

    Section 3: Chapter 3 -Risk Response & Reporting

    Lecture 43 3.1 Risk Ownership and Accountability

    Lecture 44 3.2.1 Risk Treatment Options

    Lecture 45 3.2.2 Analysis Techniques for selecting risk response

    Lecture 46 3.3 Third Party Risk Management

    Lecture 47 3.6AManagerial, Technical & Physical Controls

    Lecture 48 3.6B Preventive, Detective and Corrective Controls

    Lecture 49 3.7 Control Design & Implementation

    Lecture 50 3.8.2 Post Implementation Review

    Lecture 51 3.9.1 Control Testing and Effectiveness Evaluation

    Lecture 52 3.9.2 System Testing

    Lecture 53 3.9.3 Vulnerabilities associated with new controls

    Lecture 54 3.10 Developing a Risk Action Plan

    Lecture 55 3.11 Data collection and extraction tools and techniques

    Lecture 56 3.12.1 Risk and control monitoring techniques

    Lecture 57 3.12.2 Control Assessment Types

    Lecture 58 3.12.3 Results of Control Assessments

    Lecture 59 3.14 Key Performance Indicators

    Lecture 60 3.15.1 Key Risk Indicators

    Lecture 61 3.15.2 Lag vis-a-vis Lead Indicators

    Lecture 62 3.16 Key Control Indicators

    Lecture 63 3.16.1 Differentiating KPI, KRI and KCI

    Lecture 64 3.17 Changes to the IT Risk Profile

    Lecture 65 3.18 Control Ownership

    Section 4: Chapter 4 - Information Technology and Security

    Lecture 66 4.1.1 Enterprise Architecture

    Lecture 67 4.1.2 Security Architecture

    Lecture 68 4.1.3 Maturity Models

    Lecture 69 4.2.1 OSI layers

    Lecture 70 4.2.2 TCP / IP

    Lecture 71 4.2.3 Network Cabling

    Lecture 72 4.2.4 Network Devices

    Lecture 73 4.2.5 Types of firewalls

    Lecture 74 4.2.6 Demilitarized Zone (DMZ)

    Lecture 75 4.2.7 Proxy Server

    Lecture 76 4.2.8 Firewall Implementation

    Lecture 77 4.2.9 Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)

    Lecture 78 4.2.9A Key Aspects - Intrusion Detection System and Intrusion Prevention System

    Lecture 79 4.2.10 Domain Name System

    Lecture 80 4.2.11 Wireless Access Point

    Lecture 81 4.2.13 Virtual Private Network (VPN)

    Lecture 82 4.2.14 Cloud computing

    Lecture 83 4.3.1 Project & Program Management

    Lecture 84 4.3.2 - Phases of SDLC

    Lecture 85 4.3.3 System Migration & Changeover Techniques

    Lecture 86 4.4.1 - Enterprise Resiliency (BCP & BIA)

    Lecture 87 4.4.2 Recovery Objectives

    Lecture 88 4.4.3 Incident Response Plan and Procedures

    Lecture 89 4.5.1 Data Classification

    Lecture 90 4.5 Data Life Cycle Management

    Lecture 91 4.6.2 System Accreditation and Certification

    Lecture 92 4.6.3 Online Auditing Techniques

    Lecture 93 4.7.1 Emerging and New Technologies

    Lecture 94 4.7.2 Deepfakes

    Lecture 95 4.7.3 Internet of Things

    Lecture 96 4.7.4 BlockChain

    Lecture 97 4.7.5 Information Security Principles

    Lecture 98 4.8.1 Segregation of duties, Cross training and Job rotation

    Lecture 99 4.8.1A Segregation of Duties

    Lecture 100 4.8.2 Factor of Authentication

    Lecture 101 4.8.3 Password Management

    Lecture 102 4.8.4 Biometrics

    Lecture 103 4.8.6 Asymmetric Encryption

    Lecture 104 4.8.7 Digital Signature

    Lecture 105 4.8.8 Public Key Infrastructure (PKI)

    Lecture 106 4.9 Information Security Awareness Training

    Lecture 107 4.10 Data Privacy

    Lecture 108 4.11 Different Attack Methods

    Section 5: CRISC Mock Test

    Risk Manager, IT Manager, Auditor,IT Auditor, IT Risk Practitioner