Autoplay
Autocomplete
Previous Lesson
Complete and Continue
2025 ISACA Certified Risk and Information Systems Control | CRISC
Introduction
Introduction (4:05)
Student Portal (1:47)
CRISC Introduction (4:05)
Your Instructor (0:51)
Course Outline (5:57)
CRISC Exam (2:50)
ISACA (3:00)
Risk and control monitoring and reporting (5:36)
Define key risk indicators (KRIs) and identify key performance indicators (KPIs) to enable performance measurement key risk (6:09)
Domain 1 – Risk Management
1.1 Introduction to Risk (8:23)
1.2 Identify potential vulnerabilities to people, processes and assets (7:12)
1.3 Risk Governance vs. Risk Management (3:19)
1.4 Risk management (3:47)
1.5 Risk Management Methodology (2:30)
1.6 Risk Management Documentation (4:42)
1.7 Risk Management Process (2:19)
1.8 Business Risk Vs. IT Risk (9:21)
1.9 IT Risk Basics (15:20)
1.10 Identity And Access Management (4:18)
1.11 Non-Repudiation (6:22)
1.12 Classification (4:45)
1.13 Risk Management for IT Projects (3:51)
1.14 Risk Management for IT Projects (9:22)
1.15 Identify Risks (7:12)
1.16 Perform Qualitative Risk Analysis (8:13)
1.17 Perform Quantitative Risk Analysis (2:48)
1.18 Plan Risk Responses (10:19)
1.19 Security Governance (3:37)
1.20 Security Governance
1.21 Security Awareness and Training (3:43)
1.22 Security Awareness and Training
1.23 Gap Analysis (7:30)
1.24 Gap Analysis
1.25 Security Models (2:18)
1.26 Security Models
1.27 professional Ethics (4:32)
1.28 Professional Ethics
1.29 Security Documentation (2:47)
1.30 Security Documentation
1.31 Risk Management (4:32)
1.32 Risk management
1.33 Threat Modeling (5:16)
1.34 Threat Modeling
1.35 BCP (5:48)
1.36 BCP
1.37 Acquisition Strategy and practice (5:11)
1.38 Acquisition Strategy and Practice
1.39 Information security policy (3:08)
1.40 information security policy
Domain 2 – IT Risk Assessment
2.1 Introduction to Risk Assessment (3:27)
2.2 Risk Identification : (5:00)
2.3 ISO 27005 (8:29)
2.4 NIST 800-30 (3:13)
2.5 Risk Assessment and Identification (5:43)
2.6 Risk Assessment and Identification
2.7 Risk Assessment (4:06)
2.8 Important Definition (4:07)
2.9 Risk Analysis and Evaluation (6:37)
2.10 Risk Assessment Document (6:52)
2.11 Information Asset Management (4:05)
2.12 information asset management
2.13 Risk Scenario (7:49)
2.14 Risk Scenario
2.15 Risk Appetite and Tolerance (5:41)
2.16 Risk Appetite and Tolerance
2.17 Privacy Protection (4:06)
2.18 Privacy Protection
2.19 Asset Retention (5:17)
2.20 Asset Retention
2.21 Data Security Controls (4:02)
2.22 Data Security Controls
2.23 Secure Data Handling (5:04)
2.24 Secure Data Handling
2.25 Asset Classification (4:14)
2.26 Asset Classification
2.27 Patch and Vulnerability Management (8:04)
2.28 Patch and Vulnerability Management
New Lecture
Domain 3 – Risk Response and Mitigation
3.1 Risk Treatment (7:08)
3.2 Risk Acceptance Document (3:04)
3.3 Statement of Applicability Document (1:30)
3.4 Risk Treatment Plan (0:44)
3.5 Formulating the Risk Assessment (4:30)
3.6 Risk Treatment Plan Document (7:25)
3.7 Aligning Risk Response With Business Objectives (3:03)
3.8 Information Security Program-Part1 (13:56)
3.9 Information Security Program-Part2 (11:07)
3.10 Information Security Frameworks (1:04)
3.11 Security in the Engineering Lifecycle (5:49)
3.12 Security in the Engineering Lifecycle
3.13 Cryptography Basics - Part 1 (3:05)
3.14 Cryptography Basics - Part 1
3.15 Cryptography Basics - Part 2 (0:53)
3.16 Cryptography Basics - Part 2
3.17 Cryptography Basics - Part 3 (1:55)
3.18 Cryptography Basics - Part 3
3.19 Symmetric vs. Asymmetric Cryptography (2:34)
3.20 Symmetric vs. Asymmetric Cryptography
3.21 Cryptography Applications (Digital Rights Management, Hishing)
3.22 Cryptography Applications (Digital Rights Management, Hishing) (6:55)
3.23 Cryptography Applications (PKI,Digital Certificates and Signature)
3.24 Cryptography Applications (PKI,Digital Certificates and Signature) (4:52)
3.25 System Component Security- Part 1 (5:15)
3.26 System Component Security- Part 1
3.27 System Component Security - Part 2 (3:44)
3.28 System Component Security - Part 2
3.29 System Component security - part 3 (4:18)
3.30 System Component Security - Part 3
3.31 Security Models (3:33)
3.31 Security Models
3.32 Controls and Countermeasures in Enterprise Security (8:59)
3.33 Controls and Countermeasures in Enterprise Security
3.34 Information System Security Capabilities (7:09)
3.35 Information System Security Capabilities
3.36 Risk Response and Treatment (7:40)
3.37 Risk Response and Treatment
3.38 Third-Party Risk Management (6:36)
3.39 Third-Party Risk Management
3.40 Metrics and Reporting (3:24)
3.41 Metrics and Reporting
3.42 Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems (6:52)
3.43 Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Domain 4 – Risk and Control Monitoring and Reporting
Determine the effectiveness of control assessments
Identify and report trends/changes to KRIs/KPIs that affect control performance or the risk profile
4.1 Fundamentals of Network- Part 1 (5:16)
4.2 Fundamentals of Network- Part 1
4.3 Fundamentals of Network- Part 2 (3:33)
4.4 Fundamentals of Network- Part 2
4.5 Fundamentals of Network-Part 3 (4:04)
4.6 Fundamentals of Network-Part 3
4.7 Post-Incident Reviews and Lessons Learned (3:53)
4.9 Post-Incident Reviews and Lessons Learned
4.10 OSI Model (5:07)
4.11 OSI Model
4.12 Communication Channel Security (5:38)
4.13 Communication Channel Security
4.15 Network Attack Mitigation-Part 1 (3:52)
4.16 Network Attack Mitigation-Part 1
4.17 Network Attack Mitigation-Part 2 (5:38)
4.18 Network Attack Mitigation-Part 2
4.19 Key Performance Indicators (KPIs) (5:16)
4.20 Key Performance Indicators (KPIs)
4.21 Control Monitoring (3:18)
4.22 Control Monitoring
4.23 Audits (4:18)
4.24 Audits
4.25 Reporting Risk (5:45)
4.26 Reporting Risk
4.26 Risk Trends, Insights, and Emerging Issues (4:37)
4.27 Risk Trends, Insights, and Emerging Issues
CRISC Sample Exam
Teach online with
1.2 Identify potential vulnerabilities to people, processes and assets
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock