Certification Exam:
Mile2 C)ISRM
Covers ISACA CRISC®
Prerequisites:
A minimum of 1 year of Information Systems
Course objectives
According to this course, you'll have:
Certified by Mile2 Trainer, International Cyber Security Professional and practitioner
Authorized training materials
Friendly Placement Classroom
High Quality Classroom Equipment
The Best Catering
EXAM Voucher
Target Audience:
Information System Security Officers
Risk Managers
Information Systems Owners
Info Security Control Assessors
System Managers
State & Local Government Risk Managers
COURSE CONTENT
The Big Picture
Domain 1 Risk Identification Assessment and Evaluation
Domain 2 - Risk Response
Domain 3 - Risk Monitoring
Domain 4 - IS Control Design and Implementation
DETAILED MODULE DESCRIPTION
CISRM Part 1: The Big Picture
About the CISRM Exam
Exam Relevance
About the CISRM Exam
Section Overview
Part 1 Learning Objectives
Section Topics
Overview of Risk Management
Risk
Risk and Opportunity Management
Responsibility vs. Accountability
Risk Management
Roles and Responsibilities
Relevance of Risk Management Frameworks, Standards and Practices
Frameworks
Standards
Practices
Relevance of Risk Governance
Overview of Risk Governance
Objectives of Risk Governance
Foundation of Risk Governance
Risk Appetite and Risk Tolerance
Risk Awareness and Communication
Key Concepts of
Risk Governance
Risk Culture
Case Study
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Practice Question 5
Acronym Review
Definition Review
CISRM Part II - Domain 1 Risk Identification Assessment and Evaluation
Section Overview
Exam Relevance
Domain 1 Learning Objectives
Task Statements
Knowledge Statements
The Process
Describing the Business Impact of IT Risk
IT Risk in the Risk Hierarchy
IT Risk Categories
High Level Process Phases
Risk Scenarios
Definition of Risk Scenario
Purpose of Risk Scenarios
Event Types
Risk Scenario Development
Risk Registry & Risk Profile
Risk Scenario Development
Risk Scenario Components
Risk Scenario Development
Risk Scenario Development Enablers
Systemic, Contagious or Obscure Risk
Generic IT Risk Scenarios
Definition of Risk Factor
Examples of Risk Factors
Risk Factors— External Environment
Risk Factors— Risk Management Capability
Risk Factors— IT Capability
Risk Factors— IT Related Business Capabilities
Methods for Analyzing IT Risk
Likelihood and Impact
Risk Analysis Output
Risk Analysis Methods
Risk Analysis Methods—Quantitative
Risk Analysis Methods—Qualitative
Risk Analysis Methods—for HIGH impact risk types
Risk Analysis Methods
Risk Analysis Methods—Business Impact Analysis (BIA)
Methods for Assessing IT Risk
Identifying and Assessing IT Risk
Definitions
Adverse Impact of Risk Event
Business Impacts From IT Risk
Business Related IT Risk Types
IT Project-Related Risk
Risk Components—Inherent Risk
Risk Components—Residual Risk
Risk Components—Control Risk
Risk Components—Detection Risk
Business Risk and Threats
Addressed By IT Resources
Identifying and Assessing IT Risk
Methods For Describing
IT Risk In Business Terms
Case Study
Acronym Review
Definition Review
Domain 1 – Exercises
CISRM Part II Domain 2 - Risk Response
Section Overview
Exam Relevance
Domain 2 Learning Objectives
Task Statements
Knowledge Statements
Risk Response Objectives
The Risk Response Process
Risk Response Options
Risk Response Parameters
Risk Tolerance and Risk Response Options
Risk Response Prioritization Options
Risk Mitigation Control Types
Risk Response Prioritization Factors
Risk Response Tracking, Integration and Implementation
Process Phases
Phase 1—Articulate Risk
Phase 2—Manage Risk
Phase 3—React To Risk Events
Sample Case Study
Domain 2 – Exercise 1
CISRM Part II - Domain 3 - Risk Monitoring
Course Agenda
Exam Relevance
Learning Objectives
Task Statements
Knowledge Statements
Essentials
Risk Indicators
Risk Indicator Selection Criteria
Key Risk Indicators
Risk Monitoring
Risk Indicator Types and Parameters
Risk Indicator Considerations
Criteria for KRI Selection
Benefits of Selecting Right KRIs
Disadvantages of Wrong KRIs
Changing KRIs
Gathering KRI Data
Steps to Data Gathering
Gathering Requirements
Data Access
Data Preparation
Data Validating Considerations
Data Analysis
Reporting and Corrective Actions
Optimizing KRIs
Use of Maturity Level Assessment
Assessing Risk Maturity Levels
Risk Management Capability Maturity Levels
Changing Threat Levels
Monitoring Changes in Threat Levels
Measuring Changes in Threat Levels
Responding to Changes in Threat Levels
Threat Level Review
Changes in Asset Value
Maintain Asset Inventory
Risk Reporting
Reporting Content
Effective Reports
Report Recommendations
Possible Risk Report Recipients
Periodic Reporting
Reporting Topics
Risk Reporting Techniques
Sample Case Study
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Acronym Review
Definition Review
Domain 3 – Exercises
CISRM Part II Domain 4 - IS Control Design and Implementation
Section Overview
Exam Relevance
Domain 4 Learning Objectives
Task Statements
Knowledge Statements
C)ISRM Involvement
Control Definition
Control Categories
Control Types and Effects
Control Methods
Control Design Considerations
Control Strength
Control Strength
Control Costs and Benefits
Potential Loss Measures
Total Cost of Ownership For Controls
Role of the C)ISRM in SDLC
The SDLC Process
The Systems
Development Life Cycle (SDLC)
‘Meets and Continues to Meet’
SDLC
SDLC Phases
Addressing Risk Within the SDLC
Business Risk versus Project Risk
Understanding Project Risk
Addressing Business Risk
Understanding Business
and Risk Requirements
Understand Business Risk
High Level SDLC Phases
Project Initiation
Phase 1 – Project Initiation
Phase 1 Tasks
Task 1—Feasibility Study
Feasibility Study Components
Determining Feasibility
Outcomes of the Feasibility Study
Task 1—Define Requirement
Requirement Progression
Business Information Requirements (COBIT)
Requirements Success Factors
Task 3—Acquire Software “Options”
Software Selection Criteria
Software Acquisition
Software Acquisition Process
Leading Principles for Design and Implementation
C)ISRM Responsibilities
Key System Design Activities:
Steps to Perform Phase 2
Phase 2 - Project Design and Development
System Testing
Test Plans
Project Testing
Types of Tests
UAT Requirements
Certification and Accreditation
Project Status Reports
Phase 3 - Project Testing
Testing Techniques
Verification and Validation
Phase 4 - Project Implementation
Project Implementation
Implementation Phases
Phase 4 - Project Implementation
End User Training Plans & Techniques
Training Strategy
Data Migration/Conversion Considerations
Risks During Data Migration
Data Conversion Steps
Implementation Rollback
Data Conversion Project Key Considerations
Changeover Techniques
Post-Implementation Review
Performing Post-Implementation Review
Measurements of Critical Success Factors
Closing a Project
Project Management and Controlling
Project Management Tools and Techniques
Project Management Elements
Project Management Practices
PERT chart and critical path
PERT Attribute
Sample Case Study
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Practice Question 5