Companies Home Search Profile

CRISC -Certified in Risk and Information Systems Control '23

Focused View

Nour | Cyvitrix Train

15:43:44

28 View
  • 1 - The Security Objective and CIA Triad.mp4
    07:23
  • 2 - What is the Security Program.mp4
    04:16
  • 3 - Security vs Privacy and Essential Security Terms.mp4
    08:55
  • 4 - What is Risk Management.mp4
    14:14
  • 5 - Information Security and GRC.mp4
    08:52
  • 6 - What is Governance.mp4
    08:03
  • 7 - Information Security Governane.mp4
    03:07
  • 8 - Organizational Structure.mp4
    02:55
  • 9 - Governance Roles and Responsibilities.mp4
    22:01
  • 10 - RACI Matrix.mp4
    05:22
  • 11 - Policies.mp4
    07:21
  • 12 - Standards.mp4
    08:26
  • 13 - Procedures and Guidelines.mp4
    07:30
  • 14 - Types of Risk Resdiual and Inherent Risk.mp4
    05:01
  • 15 - Risk Management Frameworks.mp4
    02:06
  • 16 - Legal and Regulatory Requirements.mp4
    12:22
  • 17 - Security Frameworks and Standards.mp4
    08:05
  • 18 - Data Lifecycle.mp4
    08:05
  • 19 - Data Classification Level.mp4
    07:06
  • 20 - Intellectual Property.mp4
    07:32
  • 21 - The Complete Risk Management Process.mp4
    09:52
  • 22 - Risk Identification.mp4
    11:29
  • 23 - Data Privacy Requirements.mp4
    08:02
  • 24 - Privacy Regulations Roles.mp4
    03:56
  • 25 - Security Vulnerabilities Overview.mp4
    13:34
  • 26 - Security Threats.mp4
    08:13
  • 27 - Security Attacks 1.mp4
    13:50
  • 28 - Security Attacks 2.mp4
    27:28
  • 29 - Web Application Attacks.mp4
    19:06
  • 30 - Cyber Kill Chain.mp4
    06:53
  • 31 - Threat Model Overview.mp4
    08:59
  • 32 - STRIDE and DREAD Threat Model.mp4
    12:38
  • 33 - PASTA Threat Model.mp4
    04:25
  • 34 - Use Case and Abuse Case.mp4
    04:07
  • 35 - Risk Analysis and Evaluation.mp4
    15:22
  • 36 - Specialised Techniques in Risk Evaluation and Identification.mp4
    02:42
  • 37 - Vulnerability Assessment and Risk Identification.mp4
    07:27
  • 38 - Security Testing and Penetration testing techniques.mp4
    08:02
  • 39 - Business Impact Assessment.mp4
    05:22
  • 40 - Risk Response.mp4
    07:22
  • 41 - Security Controls Overview.mp4
    09:51
  • 42 - The Organisational Security Architecture.mp4
    23:43
  • 43 - Types of Security Controls.mp4
    10:58
  • 44 - Control Objective and Control Testing.mp4
    05:50
  • 45 - Defens in Depth or layered defenses.mp4
    04:22
  • 46 - Owner and Custodian.mp4
    10:17
  • 47 - Risk Reporting and Monitoring.mp4
    11:13
  • 48 - Key Performance Indicators.mp4
    04:48
  • 49 - Key Risk Indicator.mp4
    05:10
  • 50 - Incident Response Overview.mp4
    15:27
  • 51 - Security Operation Center.mp4
    05:30
  • 52 - SIEM Solution Overview.mp4
    08:30
  • 53 - Endpoint Detection and Response and Network detection and response.mp4
    06:55
  • 54 - SOAR and XDR.mp4
    06:43
  • 55 - Vulnerability Assessment tools.mp4
    05:59
  • 56 - Endpoint Protection Practices.mp4
    14:56
  • 57 - Network Security Devices.mp4
    17:45
  • 58 - VPN Wireless IoT Security.mp4
    12:45
  • 59 - Disaster Recovery Plan.mp4
    05:03
  • 60 - Business Continuity Plan.mp4
    05:36
  • 61 - Data Backup.mp4
    07:55
  • 62 - Data Backup Types.mp4
    13:41
  • 63 - Change Management Process.mp4
    06:53
  • 64 - Types of Change requests.mp4
    06:15
  • 65 - Social Engineering Attacks.mp4
    16:06
  • 66 - Security Awareness Program as a Control.mp4
    07:31
  • 67 - Application architecture and Network architecture.mp4
    23:43
  • 68 - Enterprise Architecture.mp4
    03:50
  • 69 - Computing Device Components.mp4
    20:31
  • 70 - Computing device forms and types of OS and Platforms.mp4
    19:05
  • 71 - Network Foundations.mp4
    13:17
  • 72 - Network Topologies.mp4
    10:26
  • 73 - Domain Name System.mp4
    04:49
  • 74 - OSI Model and TCPIP Model.mp4
    04:45
  • 75 - OSI Model Overview.mp4
    09:58
  • 76 - Network Security Controls.mp4
    17:45
  • 77 - Network Security Review.mp4
    07:23
  • 78 - Virtualization.mp4
    04:49
  • 79 - Software Defined Networks.mp4
    12:30
  • 80 - Containers and Functions.mp4
    09:00
  • 81 - Cloud Computing.mp4
    14:06
  • 82 - Software Development Overview.mp4
    08:57
  • 83 - Software Development Methodologies.mp4
    16:31
  • 84 - Software types and license types.mp4
    12:09
  • 85 - Intellectual Property.mp4
    07:32
  • 86 - Secure Coding.mp4
    08:21
  • 87 - AAA Concept.mp4
    06:57
  • 88 - Access Control and Authorization.mp4
    10:13
  • 89 - What is Physical Security.mp4
    15:11
  • 90 - Physical Security Controls 1.mp4
    05:52
  • 91 - Physical Security Controls 2.mp4
    05:38
  • 92 - Cryptography Overview.mp4
    10:21
  • 93 - Symmetric Encryption.mp4
    15:08
  • 94 - Asymmetric Encryption.mp4
    13:57
  • 95 - Digital Signature.mp4
    05:16
  • 96 - Hashing.mp4
    15:22
  • 97 - Cryptography Applications.mp4
    03:09
  • Description


    The Complete ISACA CRISC Training - 2023 Latest as per review manual 7th edition

    What You'll Learn?


    • Understand the main principles of IT risk management, including identification, assessment, analysis, evaluation, and treatment.
    • Learn how to conduct an effective risk assessment within an organization using various tools and techniques.
    • Develop an understanding of risk mitigation strategies and how to effectively communicate risk to stakeholders and decision-makers.
    • Become familiar with major IT control frameworks such as COBIT, COSO, and ISO 27001, and their application in the risk management process.
    • Understand the various components of information security governance such as policies, guidelines, and procedures, and their role in managing IT risk.
    • Gain knowledge of business continuity and disaster recovery planning, including the development of a disaster recovery plan and testing and maintenance.
    • Learn about regulatory and legal compliance frameworks and their impact on IT risk management.
    • Build practical skills in implementing IT risk management practices within an organization, including developing risk management plans and effectively communica
    • Gain exam preparation tips and strategies to help successfully pass the CRISC certification exam.

    Who is this for?


  • IT managers: IT managers who are responsible for managing IT operations and ensuring they are aligned with business objectives and comply with legal and regulatory requirements.
  • IT professionals: IT professionals who are responsible for implementing and managing IT processes, such as IT service management, IT security, and IT risk management.
  • Compliance professionals: Compliance professionals who are responsible for ensuring that the organization's IT processes comply with legal and regulatory requirements.
  • Risk management professionals: Risk management professionals who are responsible for identifying and managing IT risks.
  • Business analysts: Business analysts who want to understand how IT governance, security, and compliance impact their organization's business processes.
  • What You Need to Know?


  • Basic understanding of IT concepts: Participants should have a basic understanding of IT concepts such as networks, databases, and IT infrastructure.
  • Familiarity with IT management: Participants should have experience in managing IT operations, such as managing IT projects, IT services, and IT personnel.
  • More details


    Description

    Welcome to our ALL New CRISC Training


    CRISC (Certified in Risk and Information Systems Control) certification is a globally recognized credential that validates experience and knowledge in the field of IT risk management. This course is designed to prepare individuals for the CRISC exam, which covers key risk management topics such as identification, assessment, evaluation, treatment, and communication.


    By obtaining this certification, professionals will be equipped with the skills to help organizations effectively manage risks and protect critical information assets. Throughout the course, participants will gain a deep understanding of risk management principles, techniques, and frameworks that can be applied in various industries and organizations.


    The certification is highly valued by employers, and prepares professionals for a range of high-demand careers, including IT risk management, security management, and IT auditing.


    What is in this course?


    1. Overview of IT Risk Management - The course will cover the main principles of IT risk management including identification, assessment, analysis, evaluation, and treatment.


    2. Risk Assessment - You will learn how to conduct an effective risk assessment within an organization, utilizing various tools and techniques.


    3. Risk Mitigation Strategies - The course will provide an in-depth understanding of risk mitigation strategies and how to effectively communicate risk to stakeholders and decision-makers.


    4. IT Control Frameworks - The course will explore major IT control frameworks such as COBIT, COSO, and ISO 27001, and their application in the risk management process.


    5. Information Security Governance - The course will cover the various components of information security governance such as policies, guidelines, and procedures, and their role in managing IT risk.


    6. Business Continuity and Disaster Recovery - The course will introduce key concepts and practices within business continuity and disaster recovery planning, including the development of a disaster recovery plan and testing and maintenance.


    7. Regulatory and Legal Compliance - The course will provide an overview of regulatory and legal compliance frameworks and their impact on IT risk management.


    8. IT Risk Management Implementation - The course will include practical guidance on how to implement IT risk management practices within an organization, including developing risk management plans and effectively communicating risk and control measures.


    9. Exam Preparation - The course will provide participants with exam preparation tips and strategies to help them successfully pass the CRISC certification exam.


    To become CRISC certified, you must follow these steps:


    1. Meet the eligibility requirements: To be eligible for the CRISC certification, you need to have at least three years of experience in IT risk management and information systems control.


    2. Apply for the certification: You can apply for the CRISC certification through the ISACA website. You will need to provide proof of your education and experience.


    3. Prepare for the exam: You can prepare for the CRISC exam by studying the official study materials provided by ISACA or by taking a CRISC certification training course.


    4. Pass the exam: The CRISC exam consists of 150 questions and you must score at least 450 out of 800 to pass.


    5. Complete the application for certification: After passing the exam, you will need to complete the certification application and agree to ISACA's Code of Professional Ethics.


    6. Maintain the certification: To maintain your CRISC certification, you must earn 120 continuing professional education (CPE) credits every three years and pay the certification maintenance fee. Once you have completed all these steps and received your CRISC certification, you can enjoy the benefits of being a certified IT risk management and information systems control professional.


    Course requirements


    To enroll in this course, you should have a basic understanding of information security concepts and practices. There are no other prerequisites for this course. To enroll, simply visit the course landing page on Udemy and click on the "Enroll Now" button.


    The CRISC course on Udemy is an excellent choice for anyone who wants to learn about information security principles, concepts, and practices. With comprehensive coverage of the eight domains of information security, interactive quizzes and assessments, and preparation for the CRISC certification exam, this course will help you become a skilled information security Risk Manager Professional. Enroll now and start your journey towards a successful career in information security!


    Secure Your Future with Cyvitrix


    In today's digital age, cybersecurity and information security are no longer optional. With an increasing amount of sensitive information being stored and shared online, the need for top-notch security has never been greater. Welcome to Cyvitrix, your ultimate resource for comprehensive and cutting-edge cybersecurity courses.


    At Cyvitrix, we understand that knowledge is power — power to protect, power to prevent, and power to prosper. Our wide range of courses caters to everyone, from beginners who want to understand the basics to professionals seeking advanced skills to stay ahead of the curve.


    Why Choose Cyvitrix?


    1. Industry-Relevant Curriculum: We constantly update our courses to reflect the latest threats and trends in cybersecurity. You'll learn how to deal with real-world scenarios, preparing you for the challenges you'll face in the field.

    2. Expert Instructors: Our courses are taught by industry veterans with years of experience in cybersecurity and information security. They're not just teachers, they're practitioners who have been in the trenches.

    3. Flexible Learning: We believe in making learning accessible. Whether you prefer to study at your own pace online or enjoy the intensity of live online classes, we've got you covered.

    4. Certification: Upon completion of our courses, you'll receive a Cyvitrix certification, a testament to your newfound skills and a valuable addition to your professional profile.

    5. Community: Join a network of like-minded learners and experts. Share insights, ask questions, and build connections in our vibrant community.

    Whether you're looking to advance your career, start a new one, or simply enhance your understanding of cybersecurity, Cyvitrix is your trusted partner on this journey. With our courses, you're not just investing in education; you're investing in your future.

    Take the first step towards empowering your digital life. Enroll in a Cyvitrix course today.


    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.

    Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectives

    Why training with us is ideal for you?

    - Excellent quality video content

    - High courses quality

    - Organized materials

    - Real life scenarios and examples

    - Practice questions and questions ideas

    - Up to date content

    - Instructor is available to answer all questions you might get

    - Reasonable pricing


    Important Notice

    THIS COURSE IS NOT OFFICIAL, NOT SPONSORED BY ISACA


    Who this course is for:

    • IT managers: IT managers who are responsible for managing IT operations and ensuring they are aligned with business objectives and comply with legal and regulatory requirements.
    • IT professionals: IT professionals who are responsible for implementing and managing IT processes, such as IT service management, IT security, and IT risk management.
    • Compliance professionals: Compliance professionals who are responsible for ensuring that the organization's IT processes comply with legal and regulatory requirements.
    • Risk management professionals: Risk management professionals who are responsible for identifying and managing IT risks.
    • Business analysts: Business analysts who want to understand how IT governance, security, and compliance impact their organization's business processes.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Nour | Cyvitrix Train
    Nour | Cyvitrix Train
    Instructor's Courses
    Hi there!As cyber threats continue to evolve and become more sophisticated, the need for skilled cyber-security professionals has never been greater. A cyber-security trainer can play a critical role in preparing individuals and organizations to defend against cyber attacks and protect their sensitive information and assets.Here are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 97
    • duration 15:43:44
    • Release Date 2023/10/12

    Courses related to Network Security

    Subtitle
    Managing Microsoft Azure Security
    Subtitle
    Become a SOC Analyst - Level 1
    CybraryBecome a SOC Analyst - Level 1
    29:55:51
    English subtitles
    12/04/2023

    Courses related to Information Security