-
Course Code
ISAC-008
Certified in Risk and Information Systems Control™ (CRISC™)
- The Certified Risk Information Systems Control training course provides delegates with valuable technical skills, which ensure success and prosperity in the realm of IT security. The CRISC certification is a powerful manifestation of proficiency and expertise regarding various areas of risk. As well as this, CRISC demonstrates a commitment to IT security operations and enterprises, and a willingness to deliver quality within their profession. The demand for CRISC qualified individuals is ever-growing, and CRISC has been established as one of the most desirable and preferable IT security certifications worldwide.
Learning Outcomes
- Knowledgeable of the methods and processes associated with risk identification
- Risk analysis, responding to risk, and controlling risk
- Consequently, individuals will acquire experience in determining and evaluating specific risks and will learn how to achieve business objectives via the design, implementation, observation, and preservation of risk-based, competent information security disciplines
- As well as this, participants will discover how to address challenges that they may encounter in the field of IT and will be able to adapt CRISC principles to their own organization
Course Contents
- Reviewing cloud computing concepts
- Describing cloud reference architecture
- Security concepts relevant to cloud computing
- Design principles of secure cloud computing
- Identifying trusted cloud services
- Understanding cloud data lifecycle
- Designing and implementing cloud data storage architectures
- Designing and applying data security strategies
- Understanding and implementing data discovery and classification technologies
- Designing and implementing relevant jurisdictional data protections for personally identifiable information
- Comprehending cloud infrastructure components
- Analyzing risks associated to cloud infrastructure
- Designing and planning security controls
- Planning disaster recovery and business continuity management
- Recognizing the need for training and awareness in application security
- Understanding cloud software assurance and validation
- Using verified secure software
- Comprehending the Software Development Lifecycle (SDLC) process
- Applying the Secure Software Development Lifecycle
- Supporting the planning process for the data center design
- Implementing and building physical infrastructure for cloud environment
- Running physical infrastructure for cloud environment
- Managing physical infrastructure for cloud environment
- Building logical infrastructure for cloud environment
- Legal requirements and unique risks within the cloud environment
- Privacy issues, including jurisdictional variation
- The audit process, methodologies, and required adaptions for a cloud environment
- Implications of cloud to enterprise risk management
- Outsourcing and cloud contract design
Architectural Concepts and Designs Requirements
Cloud Data Security
Cloud Platform and Infrastructure Security
Cloud Application Security
Operations
Legal and Compliance
Our Methodology
- Make coaching and monitoring innovative and using modern
- Media training also using on the go training by using interactive means and focusing on
- The exercises, practical applications and real situations study
- Live delivery method, instructor-led training
- Experienced consultant, trainers, and professional
- Qualified trainer with high-level experience
Attendance Reports
- Send daily attendance reports to training departments
- Send full attendance report to training dep. by the end of the course
- Attend 100 % from the course days also provide daily
- Issue attendance certificate for participant who attend minimum 80% from the course duration
Pre/Post Reports
- Pre- assessment before starting training
- Post assessment after finish training
- Full report for the deferent between Pre-& Post assessment
Who Should Attend
- This Certified Risk Information Systems Control training course is intended for anyone who manages IT risk and information security controls within their job role. Likewise, this CRISC course is intended for experienced IT professionals who would like to prepare for the CRISC exam.