Certified in Risk and Information Systems Control™ (CRISC™)

  • Course Code
    ISAC-008

Certified in Risk and Information Systems Control™ (CRISC™)

  • The Certified Risk Information Systems Control training course provides delegates with valuable technical skills, which ensure success and prosperity in the realm of IT security. The CRISC certification is a powerful manifestation of proficiency and expertise regarding various areas of risk. As well as this, CRISC demonstrates a commitment to IT security operations and enterprises, and a willingness to deliver quality within their profession. The demand for CRISC qualified individuals is ever-growing, and CRISC has been established as one of the most desirable and preferable IT security certifications worldwide.

Learning Outcomes

    • Knowledgeable of the methods and processes associated with risk identification
    • Risk analysis, responding to risk, and controlling risk
    • Consequently, individuals will acquire experience in determining and evaluating specific risks and will learn how to achieve business objectives via the design, implementation, observation, and preservation of risk-based, competent information security disciplines
    • As well as this, participants will discover how to address challenges that they may encounter in the field of IT and will be able to adapt CRISC principles to their own organization

Course Contents

    Architectural Concepts and Designs Requirements

    • Reviewing cloud computing concepts
    • Describing cloud reference architecture
    • Security concepts relevant to cloud computing
    • Design principles of secure cloud computing
    • Identifying trusted cloud services

    Cloud Data Security

    • Understanding cloud data lifecycle
    • Designing and implementing cloud data storage architectures
    • Designing and applying data security strategies
    • Understanding and implementing data discovery and classification technologies
    • Designing and implementing relevant jurisdictional data protections for personally identifiable information

    Cloud Platform and Infrastructure Security

    • Comprehending cloud infrastructure components
    • Analyzing risks associated to cloud infrastructure
    • Designing and planning security controls
    • Planning disaster recovery and business continuity management

    Cloud Application Security

    • Recognizing the need for training and awareness in application security
    • Understanding cloud software assurance and validation
    • Using verified secure software
    • Comprehending the Software Development Lifecycle (SDLC) process
    • Applying the Secure Software Development Lifecycle

    Operations

    • Supporting the planning process for the data center design
    • Implementing and building physical infrastructure for cloud environment
    • Running physical infrastructure for cloud environment
    • Managing physical infrastructure for cloud environment
    • Building logical infrastructure for cloud environment

    Legal and Compliance

    • Legal requirements and unique risks within the cloud environment
    • Privacy issues, including jurisdictional variation
    • The audit process, methodologies, and required adaptions for a cloud environment
    • Implications of cloud to enterprise risk management
    • Outsourcing and cloud contract design

Our Methodology

    • Make coaching and monitoring innovative and using modern
    • Media training also using on the go training by using interactive means and focusing on
    • The exercises, practical applications and real situations study
    • Live delivery method, instructor-led training
    • Experienced consultant, trainers, and professional
    • Qualified trainer with high-level experience

Attendance Reports

    • Send daily attendance reports to training departments
    • Send full attendance report to training dep. by the end of the course
    • Attend 100 % from the course days also provide daily
    • Issue attendance certificate for participant who attend minimum 80% from the course duration

Pre/Post Reports

    • Pre- assessment before starting training
    • Post assessment after finish training
    • Full report for the deferent between Pre-& Post assessment

Who Should Attend

    • This Certified Risk Information Systems Control training course is intended for anyone who manages IT risk and information security controls within their job role. Likewise, this CRISC course is intended for experienced IT professionals who would like to prepare for the CRISC exam.
Date City Venue Language Price Status Register
01 Dec 05 Dec - 2024 Cairo 5 Stars Hotel English $ 3750 Planned Register
01 Dec 05 Dec - 2024 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register
22 Dec 26 Dec - 2024 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register
22 Dec 26 Dec - 2024 Cairo 5 Stars Hotel English $ 3750 Planned Register
23 Feb 27 Feb - 2025 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register
18 May 22 May - 2025 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register
29 Jun 03 Jul - 2025 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register
10 Aug 14 Aug - 2025 Cairo 5 Stars Hotel English $ 4250 Planned Register
31 Aug 04 Sep - 2025 Cairo 5 Stars Hotel English $ 4250 Planned Register
26 Oct 30 Oct - 2025 Cairo 5 Stars Hotel English $ 4250 Planned Register
30 Nov 04 Dec - 2025 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register
21 Dec 25 Dec - 2025 Sharm El Sheikh 5 Stars Hotel English $ 4250 Planned Register