Professional Documents
Culture Documents
Course Description: Certified in Risk and Information Systems Control (CRISC) by ISACA is
for IT and business professionals who develop and maintain information system controls, and
whose job revolves around security operations and compliance. CRISC is implemented into
operational and management level positions at organizations of almost any size. This course
focuses on four main domain areas: (1) IT Risk Identification, (2) IT Risk Assessment, (3) Risk
Response and Reporting, and (4) Information Technology and Security. Our CRISC course will
prepare you for identifying, evaluating, and managing risk through the construction,
implementation, and maintenance of IS controls.
Course Outcomes: By the end of this course, you should be able to:
● Effectively prepare and enact strategic and focused plans to mitigate risk
● Explain the advantages of approaching security by focusing on the business
● Set common language and perspective risks that can become the baseline for risk
management within their organizations
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Course Outline
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
● Lesson 4.8: NIST SP 800-37 Rev 1 and SDLC
● Lesson 4.9: ISO 27005 Risk Management Standard
● Lesson 4.10: Risk Assessment Tools and Techniques
● Lesson 4.11: Cost-Benefit Analysis and ROI
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
● Lesson 6.19: Course Conclusion
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4