Certified Risk and Information Systems Control (CRISC) Training

Code: 2037 Category: Tag:

This official ISACA CRISC certification course provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and control monitoring and reporting.

IT and enterprise risk management is key to an organization’s operations and strategy. If you are an IT professional, risk and control professional, business analyst, project manager or compliance professional, this Certified Risk and Information Systems Control training course will teach you to defend, protect and future-proof your enterprise.

To earn CRISC certification, you must pass the CRISC exam and show three years experience in the fields of risk management and IS control, per ISACA’s requirements.
This is an ISACA certification prep course. Click here to view more ISACA certification prep training ›

The ISACA Exam Candidate Information Guide provides valuable information regarding exam day rules and information as well as exam dates and deadlines. You can find the most recent version at ISACA.org

Certified Risk and Information Systems Control (CRISC) Training Delivery Methods
Official ISACA curriculum
After-course instructor coaching benefit
Course tuition includes an exam voucher from ISACA
Certified Risk and Information Systems Control (CRISC) Training Course Benefits
Prepare for and pass the Certified Risk and Information System Controls (CRISC) examIdentify the universe of IT risk to contribute to the execution of the IT risk management strategyAnalyze and evaluate IT risk to determine the likelihood and impact on business objectivesDetermine risk response options and evaluate their efficiency and effectiveness to manage riskContinuously monitor and report on IT risk and controls
CRISC Certification Course Outline
Domain 1 — IT Risk Identification
1.1: Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization’s business objectives and operations.
1.2: Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis.
1.3: Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.
1.4: Identify key stakeholders for IT risk scenarios to help establish accountability.
1.5: Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.
1.6: Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.
1.7: Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.
Domain 2 — IT Risk Assessment
Domain 3 — Risk Response and Mitigation
Domain 4 — Risk and Control Monitoring and Reporting

Request Quotes

Register now

Please type the characters This helps us prevent spam, thank you.

Android Application Development & Programming Training

Configuring Cisco ISE Essentials for SD-Access (ISESDA)

Microsoft Security, Compliance, and Identity Fundamentals Training (SC-900)

Certified Information Security Manager (CISM) Training and Certification

SAFe® for Teams Training

Azure Data Factory Training: Designing and Implementing Data Integration Solutions

ITIL® 4 Specialist: High-Velocity IT Training

Kanban Management Professional Training (KMP-II Certification)

Stealthwatch Cloud Foundations 7.3 (SWCF)

Microsoft 365 Security Administrator (MS-500)