CRISC® Boot Camp
Become a CRISC and defend, protect and future-proof your enterprise
Experienced & accredited trainers
Accredited training material
Excellent first attempt pass ratio
Free lifetime course revision – What’s this?
This four-day training course enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise. ISACA®’s Certified in Risk and Information Systems Control™ (CRISC™) certification instantly validates skills and expertise in risk and information systems control. It proves ability to understand and articulate business risk, implement appropriate IS controls and develop effective plans to mitigate risk.
- To identify the universe of IT risk to contribute to the execution of the IT risk management strategy
- To analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision making.
- To determine risk response options and evaluate their efficiency and effectiveness to manage risk in alignment with business objectives.
- To monitor and report on IT risk and controls to relevant stakeholders to ensure the continued efficiency and effectiveness of the IT risk management strategy and its alignment to business objectives.
- IT professionals
- Risk professionals
- Control professionals
- Business analysts
- Project managers
- Compliance professionals
This training is based on both theory and practice:
- Sessions of lectures illustrated with examples based on real cases
- Practical exercises based on a full case study including role playing and oral presentations
- Review exercises to assist the exam preparation
- Practice test similar to the certification exam.
- Course reference manual containing copy of course slides, support documents, quizzes and answers
- Course Certificate
- Domain 1—IT Risk Identification
- Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments
- Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis.
- Develop a comprehensive set of IT risk scenarios based on available information.
- Identify key stakeholders for IT risk scenarios to help establish accountability.
- Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.
- To identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.
- Collaborate in the development of a risk awareness program, and conduct training
- Domain 2—IT Risk Assessment
- Analyze risk scenarios based on organizational criteria
- Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.
- Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.
- Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.
- Communicate the results of risk assessments to senior management and appropriate stakeholders.
- Update the risk register with the results of the risk assessment.
- Domain 3—Risk Response and Mitigation
- Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.
- Consult with, or assist, risk owners on the development of risk action plans.
- Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.
- Ensure that control ownership is assigned to establish clear lines of accountability.
- Assist control owners in developing control procedures and documentation.
- Update the risk register to reflect changes in risk and management’s risk response.
- Validate that risk responses have been executed according to the risk action plans.
- Domain 4—Risk and Control Monitoring and Reporting
- Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.
- Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.
- Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.
- Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.
- Monitor and analyze key performance indicators (KPIs).
- Review the results of control assessments to determine the effectiveness of the control environment.
A practice exam is part of the course. The practice exam aims to help participants in passing the CRISC certification exam.
CRISC certification exam is not included in this training course. Candidates interested in CRISC examination must submit their application directly at ISACA.
To earn CRISC certification, you must pass the CRISC exam and show three years’ experience in the fields of risk management and IS control, per ISACA’s requirements
Free lifetime revision
Refresh your concepts by re-attending our training session for FREE. (What’s this?)
Accredited Training Organization
Business Beam is certified partner of AXELOS Limited and an ATO.
Accredited course material
The training material is accredited and approved.
Quality Training Material
You will receive a comprehensive training manual.
Our trainers are experienced consultants and accredited trainers.
92%+ of our overall customers rates us excellent or very good.
Experience tells all
We have successfully delivered 600+ accredited courses to 7,000+ professionals in classroom.
At your premises
This training is also available at your preferred premises and timings.
Copyright © 2004-2020 Business Beam. All rights reserved unless otherwise stated. ITIL, PRINCE2, PRINCE2 Agile, MSP, MoP, P3O, MoV, M_o_R and RESILIA are registered trademarks of AXELOS Limited. ISACA and COBIT are registered trademarks of ISACA. All logos and trademarks are the property of their respective owners.