Certified in Risk and Information Systems Control (CRISC)
Gaining expertise in Risk Management can be achieved by earning the Certified in Risk and Information Systems Control® (CRISC®) certification. You can improve your company’s business resilience, provide value to stakeholders, and maximize risk management throughout the organization by studying a proactive strategy based on Agile methodology.
Overview
The ISACA created the CRISC (Certified in Risk and Information Systems Control) course to impart knowledge and abilities in risk and information systems control. It aids experts in comprehending how to apply and maintain IT controls correctly to reduce danger and boost security within a company. Information systems, risk management, corporate risk management, and control objectives are among the subjects covered in the course. Users who successfully complete the course will receive a globally recognized CRISC certification. Professionals in audit, security, and IT risk and compliance jobs may find this training useful.
Learning objectives of the CRISC certification?
1. Assess IT risk and operating effectiveness of the various control procedures.
2. Develop, implement, and maintain information systems controls, such as access control and audit controls.
3. Design and implement effective control strategies, such as security policies, processes and procedures.
4. Understand and effectively apply IS controls to meet compliance objectives, including Sarbanes-Oxley (SOX), HIPAA, and PCI DSS.
5. Identify business risks and those related risks.
6. Develop appropriate strategies for risk treatment.
7. Utilize best practices for risk management.
8. Properly maintain and document the information systems’ control environment.
9. Maintain up-to-date knowledge and awareness of current trends and regulatory reforms pertaining to risk and control management.
Who should go for CRISC certification?
- The primary audience targetted for Certified in Risk and Information Systems Control (CRISC) training are Information Technology (IT) professionals, such as Managers, IT Auditors, Security Administrators, IT Risk Managers, IT Security Analysts, and Business Analysts with at least three to five years of experience in IT risk management and information risk management
- The training is also useful for anybody involved in the fields of IT Risk Management and Risk Information Systems such as IT Risk Assessors, IT Business Continuity and Disaster Recovery personnel, and Internal Control professionals
- In addition to IT professionals, the course can also be beneficial for security consultants, Internal IT Auditors, Chief Risk Officers, Information and Data Protect Managers, IT/Security/Privacy Compliance Managers, and Finance/Accounting Managers
- These individuals who are specifically involved in operational, technical, risk and/or information security processes within their organisation can also benefit from this course
- Overall, CRISC certification is ideal for anybody associated with the management of IT and information risk, as well as those who are looking to pursue a career in the field of IT Audit, Compliance Management and Risk Management
Our Package
Organizational Governance A
- Organizational strategy, goals and objectives
- Organizational structure, roles and responsibilities
- Organizational culture
- Policies and standards
- Business processes
- Organizational assets
Risk Governance B
- Enterprise risk management and risk management framework
- Three lines of defense
- Risk profile
- Risk appetite and risk tolerance
- Legal, regulatory and contractual requirements
- Professional ethics of risk management
IT Risk Identification A
- Risk events (e.g., contributing conditions, loss result)
- Threat modeling and threat landscape
- Vulnerability and control deficiency analysis (e.g., root cause analysis)
- Risk scenario development
IT Risk Analysis and Evaluation B
- Risk assessment concepts, standards and frameworks
- Risk register
- Risk analysis methodologies
- Business impact analysis
- Inherent and residual risk
Risk Response A
- Risk treatment/risk response options
- Risk and control ownership
- Third-party risk management
- Issue, finding and exception management
- Management of emerging risk
Control Design and Implementation B
- Control types, standards and frameworks
- Control design, selection and analysis
- Control implementation
- Control testing and effectiveness evaluation
Risk Monitoring and Reporting C
- Risk treatment plans
- Data collection, aggregation, analysis and validation
- Risk and control monitoring techniques
- Risk and control reporting techniques (heatmap, scorecards and dashboards)
- Key performance indicators
- Key risk indicators (KRIs)
- Key control indicators (KCIs)
Information Technology Principles A
- Enterprise architecture
- IT operations management (e.g., change management, IT assets, problems and incidents)
- Project management
- Disaster recovery management (DRM)
- Data lifecycle management
- System development life cycle (SDLC)
- Emerging technologies
Information Security Principles B
- Information security concepts, frameworks and standards
- Information security awareness training
- Business continuity management
- Data privacy and data protection principle
Upcoming Batch
April 20th (Weekends)
FRI & SAT (4 Weeks)
08:30 PM to 01:00 AM (CDT)
April 18th (Weekdays)
MON – FRI (18 Days)
10:00 AM to 12:00 PM (CDT)
Certified in Risk and Information Systems Control (CRISC) FAQs
- Pass the CRISC Exam within the last 5 years.
- Work experience must be gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the exam.
- A minimum of three years of cumulative work experience as a CRISC professional across at least two of the four CRISC domains is compulsory.
- Of these two (2) required domains, one (1) must be in either Domain 1 or 2.
- Submit the CRISC Certification Application including Application Processing Fee.
On 200-800 point scale, ISACA has set 450 as the passing mark for the exams.
The prerequisites for CRISC Training include:
1. A professional-level knowledge of risk management.
2. A minimum of 5 years hands-on Information Security experience in either information technology or cybersecurity.
3. Experience with IT controls, auditing processes, and the connection between risks and control objectives.
4. Understanding of the relationship between business objectives and IT risk.
5. Familiarity with applicable laws, regulations, and industry best practices related to IT risk management.
Reviews
There are no reviews yet.