IT Project Management
The Certified in Risk and Information Systems Control™ certification is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.
The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.
CRISC course covers how to establish an appropriate infrastructure and culture and apply a logical and systematic method of establishing the context, identifying, analyzing, evaluating, treating, monitoring and communicating IT risks associated with any activity, function or process in a way that will enable organizations to minimize losses and maximize gains. At the completion of this course, the participants should be able to :
IT professionals interested in earning Certified in Risk and Information Systems Controls (CRISC) certification. CRISC is for IT professionals, risk professionals, business analysts, project manager and/or compliance professionals, how work towards evaluation and mitigation of risk, and who have job experience in the following areas:
Segment 1 : Risk Identification, Assessment and Evaluation (RI) : (31%)
The segment defines Process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what countermeasures
Segment 2 : Risk Response (RR) : (17%)
The participants learn to recognize the following issues in the risk management processes such as:
Segment 3 : Risk Monitoring (RM) : (17%)
This segment shall describe on techniques for monitoring and assessment of implemented Risk Response wiithin the cycle of risk management.
Segment 4 : Information Systems Controls Design and Implementation : (17%)
The segment shall describe on the mechanism of controls, mapping control to IT assets and IT assets within the perspective of effective control design as related to the operation of information system. Particaipants shall be guided to identify the suitable and congruent controls as required by identified risks, and perform reliable risk-control mapping.
Segment 5 : Information Systems Control Monitoring and Maintenance : (18%)
This segment shall describe to the participants how to establish effective risk management program that covers:
Segment 6 : Cases
IT risk management cases
SBKI Training Center
Hand Phone: 0812 9713 1551
Training Certified Information Security Manager (CIISM™) AAFM IT Project Management Description The Certified Information Security Manager (CIISM™) certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. The CIISM certification is for the individual... Selengkapnya
Finance Project Management, Training Project Management Deskripsi Program: Project finance merupakan salah satu pendekatan untuk mengoptimalkan return suatu proyek investasi. Pendanaan investasi suatu proyek dengan skema project financing ini berbeda dengan skema pinjaman konvensional dan dipandang lebih memiliki advantages dibandingkan dengan... Selengkapnya
Training Accredited Agile Project Manager (AgCC) Sertifikasi AAPM Training Project Management AGCC Agile Communications Certification – Project Management Communications By attending this practical and informative course, you will: Re fine your communication competence Grasp the essential elements of Agile Project Management Be trained,... Selengkapnya
Silahkan pilih kategori artikel yang ingin Anda telusuri.