CRISC Certified in Risk and Information Systems Control
Language: English | Size:15.14 GB
Genre:eLearning
Files Included :
1 - Course Overview.mp4 (90.49 MB)
MP4
10 - The Value of Risk Communication.mp4 (236.62 MB)
MP4
11 - What are Policies Standards and Procedures.mp4 (240.45 MB)
MP4
12 - Reviewing the Business Process.mp4 (108.84 MB)
MP4
13 - Risk Management Principles Processes and Controls.mp4 (216.19 MB)
MP4
14 - IT Risk and its Relation to Other Business Functions.mp4 (267.35 MB)
MP4
15 - Project Risk and Change Risk.mp4 (126.2 MB)
MP4
16 - People and Technology.mp4 (179.83 MB)
MP4
17 - Data and Intellectual Property.mp4 (139.88 MB)
MP4
18 - IT Risk Management and Good Practices.mp4 (131.71 MB)
MP4
19 - Three Lines of Defense.mp4 (236.85 MB)
MP4
2 - IT Risk Management Context.mp4 (325.56 MB)
MP4
20 - What is a Risk Profile.mp4 (185.14 MB)
MP4
21 - Risk Appetite Tolerance and Capacity.mp4 (226.03 MB)
MP4
22 - Legal Contractual and Regulatory Requirements.mp4 (285.71 MB)
MP4
3 - Key Concepts of Risk.mp4 (318.15 MB)
MP4
4 - The Importance and Value of IT Risk Management and Business Strategy.mp4 (236.58 MB)
MP4
5 - The RACI Chart.mp4 (172.91 MB)
MP4
6 - Key Roles Regarding Risk.mp4 (166.3 MB)
MP4
7 - Organizational Structure and Culture.mp4 (218.92 MB)
MP4
8 - The Impact on Risk Management of Culture and Behavior.mp4 (241.04 MB)
MP4
9 - Risk Culture.mp4 (136.27 MB)
MP4
23 - Identifying Risk Events.mp4 (328.95 MB)
MP4
24 - Identifying Risk Factors.mp4 (252.35 MB)
MP4
25 - Changes in the Risk Environment.mp4 (188.77 MB)
MP4
26 - Threat Modeling and Threat Landscape.mp4 (275.86 MB)
MP4
27 - How to Perform Threat Modeling and AbuseCase Modeling.mp4 (252.97 MB)
MP4
28 - Sources of Vulnerabilities.mp4 (339.79 MB)
MP4
29 - Vulnerability Assessment and Penetration Testing.mp4 (351.85 MB)
MP4
30 - Risk Scenario Development.mp4 (224.55 MB)
MP4
31 - Risk Assessment Standards and Frameworks.mp4 (232.25 MB)
MP4
32 - Tools of Risk Assessment.mp4 (285.29 MB)
MP4
33 - Risk Analysis Methodologies.mp4 (282.86 MB)
MP4
34 - Business Impact Analysis.mp4 (230.23 MB)
MP4
35 - Inherent Residual and Current Risk.mp4 (200.48 MB)
MP4
36 - Mitigation Transference and Avoidance as Risk Responses.mp4 (299.89 MB)
MP4
37 - Risk Acceptance as a Response.mp4 (196.66 MB)
MP4
38 - Who Owns and Controls Risk.mp4 (206.57 MB)
MP4
39 - Involving Thirdparty Risk Management.mp4 (178.82 MB)
MP4
40 - Issue Finding and Exceptions.mp4 (333.45 MB)
MP4
41 - Managing Emergent Risk.mp4 (259.22 MB)
MP4
42 - Types Standards and Frameworks.mp4 (278.84 MB)
MP4
43 - Control Design Selection and Analysis.mp4 (149.93 MB)
MP4
44 - Implementing Controls.mp4 (379.8 MB)
MP4
45 - Testing the Effectiveness of Controls.mp4 (277.44 MB)
MP4
46 - Risk Response Plans.mp4 (161.85 MB)
MP4
47 - Collecting Aggregating Analyzing and Validating Data.mp4 (206.96 MB)
MP4
48 - Monitoring Techniques for Risk and Controls.mp4 (246.73 MB)
MP4
49 - Reporting Techiques for Risk and Control.mp4 (150.68 MB)
MP4
50 - Using Key Performance Indicators KPIs.mp4 (162.15 MB)
MP4
51 - Using Key Risk Indicators KRIs.mp4 (143.74 MB)
MP4
52 - Using Key Control Indicators KCIs.mp4 (138.62 MB)
MP4
53 - The Scope of Enterprise Architecture.mp4 (260.79 MB)
MP4
54 - Hardware and Software.mp4 (292.28 MB)
MP4
55 - Networking Fundamentals.mp4 (354.09 MB)
MP4
56 - Virtualization and Cloud.mp4 (204.27 MB)
MP4
57 - Project Management.mp4 (217.91 MB)
MP4
58 - Disaster Recovery and Business Continuity.mp4 (192.97 MB)
MP4
59 - Risk in the Data Life Cycle.mp4 (141.19 MB)
MP4
60 - Risk in the System Development Life Cycle.mp4 (201.53 MB)
MP4
61 - Emerging Technologies.mp4 (289.11 MB)
MP4
62 - Information Security Concepts.mp4 (301.57 MB)
MP4
63 - The CIA Triad.mp4 (309.23 MB)
MP4
64 - Access Control.mp4 (244.17 MB)
MP4
65 - What is Encryption.mp4 (334.72 MB)
MP4
66 - Information Security Awareness and Training.mp4 (264.46 MB)
MP4
67 - Data Privacy Fundamentals.mp4 (188.27 MB)
MP4