CRISC - Certified in Risk and Information Systems Control (CRISC)
Duration: 3.0 days
Description
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The Certified in Risk and Information Systems Control (CRISC) program, sponsored by ISACA, recognizes a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor and maintain information systems (IS) controls to mitigate such risk.
This three day training course prepares participants for the CRISC examination by providing a conducive learning environment where the skillsets and knowledge required of a information systems risk management professional can be acquired comprehensively.
The Certified in Risk and Information Systems Control™ certification (CRISC™, pronounced “see-risk”) is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.
The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.
Objectives
This seminar has been designed to prepare Delegates for the CRISC examination by enabling them to supplement their existing knowledge and understanding so as to be better prepared to pass the exam, as defined by ISACA.
•Designing, implementing, monitoring & maintaining risk-based, effective IS controls
•Compliance with regulatory requirements
Audience
IT professionals interested in earning Certified in Risk and Information Systems Controls (CRISC) certification. CRISC is for IT professionals, risk professionals, business analysts, project manager and/or compliance professionals, how work towards evaluation and mitigation of risk, and who have job experience in the following areas:
•Risk identification, assessment and evaluation
•Risk response and monitoring
•IS control design/monitoring and implementation/maintenance
Key Topics
Module 1: Risk Identification, Assessment and Evaluation
Module 2: Risk Response
Module 3: Risk Monitoring
Module 4: Information Systems Control Design and Implementation
Module 5: Information Systems Control Monitoring and Maintenance