Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Certified Information Systems Risk Manager (Cisrm)

Posted By: ELK1nG
Certified Information Systems Risk Manager (Cisrm)

Certified Information Systems Risk Manager (Cisrm)
Last updated 11/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.35 GB | Duration: 4h 6m

Certification Course

What you'll learn
Perform Risk Tracking, Integration, and Implementation
Understand the Benefits of Selecting Right KRIs
Understand the Role of the CISRM in SDLC
Understand the Methods for Describing IT Risk in Business Terms
Articulate Risk, Manage Risk, React to Risk event
Address Risk within the SDLC
Requirements
A background learning and practical experience in IT and IS will be required to actively participate and advance in this course.
Description
Do you have a burning desire to improve your information system risks technique? Then CISRM is the right choice as it is packed with such impactful topics as Risk Identification, Assessment, Evaluation, Response, Mentoring, and so much more.This course prepares you for the CISRM exam. For the duration of this course, participants will be exposed to knowledge-based training with relevant and equally advanced descriptions and illustrations of various information system risk-based elements, and how to overcome it all. There will also be practical cases to enhance your technique to becoming a management professional. Commence your journey into this next phase of action in your life and broaden your future career opportunity with CISRM. REGISTER NOW!

Overview

Section 1: Part I - The Big Picture: How Risk Management Relates to Risk Governance

Lecture 1 The Big Picture: How Risk Management Relates to Risk Governance

Lecture 2 About the C)ISRM Exam

Lecture 3 Exam Relevance

Lecture 4 About the C)ISRM Exam

Lecture 5 C)ISRM Review Course

Lecture 6 Section Overview

Lecture 7 Part 1 Learning Objectives

Section 2: Risk Management

Lecture 8 Section Topics

Lecture 9 Overview of Risk Management

Lecture 10 Risk

Lecture 11 Risk and Opportunity Management

Lecture 12 Responsibility vs. Accountability

Lecture 13 Responsibility vs. Accountability

Lecture 14 Risk Management Roles and Responsibilities

Section 3: Risk Management Frameworks, Standards and Practices

Lecture 15 Relevance of Risk Management Frameworks, Standards and Practices

Lecture 16 Frameworks

Lecture 17 Standards

Lecture 18 Practices

Section 4: Essentials of Risk Governance

Lecture 19 Relevance of Risk Governance

Lecture 20 Overview of Risk Governance

Lecture 21 Objectives of Risk Governance

Lecture 22 Foundation of Risk Governance

Lecture 23 Objectives of Risk Governance—cont.

Lecture 24 Objectives of Risk Governance—cont.

Lecture 25 Objectives of Risk Governance—cont.

Section 5: Risk Appetite and Tolerance

Lecture 26 Risk Appetite and Risk Tolerance

Lecture 27 Risk Appetite and Risk Tolerance—cont.

Lecture 28 Risk Appetite and Risk Tolerance—cont.

Section 6: Risk Awareness and Communication

Lecture 29 Risk Awareness and Communication

Lecture 30 Risk Awareness and Communication—cont.

Lecture 31 Risk Awareness and Communication—cont.

Lecture 32 Key Concepts of Risk Governance

Lecture 33 Key Concepts of Risk Governance

Section 7: Risk Culture

Lecture 34 Risk Culture—cont.

Lecture 35 Risk Culture

Section 8: Case Study & Practice Questions

Lecture 36 Case Study

Lecture 37 Practice Question 1

Lecture 38 Practice Question 2

Lecture 39 Practice Question 3

Lecture 40 Practice Question 4

Lecture 41 Practice Question 5

Section 9: Definitions and Acronyms

Lecture 42 Acronym Review

Lecture 43 Definition Review

Lecture 44 Definition Review

Section 10: Supplemental Exercises

Lecture 45 Big Picture Exercises

Section 11: Suggested Resources for Further Study

Lecture 46 Suggested Resources for Further Study

Lecture 47 End of C)ISRM Part I - The Big Picture

Section 12: Part II Domain 1 - Risk Identification, Assessment and Evaluation

Lecture 48 Risk Identification, Assessment and Evaluation

Lecture 49 Section Overview

Lecture 50 Exam Relevance

Lecture 51 Domain 1 Learning Objectives

Lecture 52 Domain 1 Learning Objectives—cont.

Section 13: Tasks and Knowledge Statements

Lecture 53 Task Statements

Lecture 54 Knowledge Statements

Lecture 55 Knowledge Statements—cont.

Lecture 56 Knowledge Statements

Section 14: Risk Identification, Assessment and Evaluation

Lecture 57 The Process

Lecture 58 The Process—cont.

Lecture 59 Describing the Business Impact of IT Risk

Lecture 60 Describing the Business Impact of IT Risk

Lecture 61 Describing the Business Impact of IT Risk

Lecture 62 IT Risk in the Risk Hierarchy

Lecture 63 IT Risk Categories

Lecture 64 High Level Process Phases

Section 15: Generic Risk Scenarios

Lecture 65 Risk Scenarios

Lecture 66 Definition of Risk Scenario

Lecture 67 Event Types

Lecture 68 Purpose of Risk Scenarios

Section 16: Risk Scenario Development

Lecture 69 Risk Scenario Development

Lecture 70 Risk Scenario Development—cont.

Lecture 71 Risk Scenario Development—cont.

Lecture 72 Risk Register

Lecture 73 Risk Profile

Lecture 74 Risk Scenario Development

Lecture 75 Risk Scenario Components

Lecture 76 Risk Scenario Development

Lecture 77 Risk Scenario Development—cont

Lecture 78 Risk Scenario Development Enablers

Lecture 79 Systemic, Contagious or Obscure Risk

Lecture 80 Generic IT Risk Scenarios

Lecture 81 Generic IT Risk Scenarios—cont.

Section 17: Risk Factors

Lecture 82 Definition of Risk Factor

Lecture 83 Examples of Risk Factors

Lecture 84 Risk Factors –-cont.

Lecture 85 Risk Factors— External Environment

Lecture 86 Risk Factors— External Environment—cont.

Lecture 87 Risk Factors— Internal Environment

Lecture 88 Risk Factors— Internal Environment

Lecture 89 Risk Factors— Internal Environment

Lecture 90 Risk Factors— Internal Environment

Lecture 91 Risk Factors— Internal Environment—cont.

Lecture 92 Risk Factors— Internal Environment—cont.

Lecture 93 Risk Factors— Internal Environment—cont.

Lecture 94 Risk Factors— Risk Management Capability

Lecture 95 Risk Factors— IT Capability

Lecture 96 Risk Factors— IT Related Business Capabilities

Section 18: Risk Assessment Methods

Lecture 97 Methods for Analyzing IT Risk

Lecture 98 Likelihood and Impact

Lecture 99 Risk Analysis Output

Lecture 100 Risk Analysis Output

Lecture 101 Risk Analysis Methods

Lecture 102 Risk Analysis Methods— Quantitative

Lecture 103 Risk Analysis Methods— Qualitative

Lecture 104 Risk Analysis Methods— for HIGH impact risk types

Lecture 105 Risk Analysis Methods

Lecture 106 Risk Analysis Methods— Business Impact Analysis (BIA)

Lecture 107 Methods for Assessing IT Risk

Section 19: IT Risk Identification and Assessment

Lecture 108 Identifying and Assessing IT Risk

Lecture 109 Definitions

Lecture 110 Adverse Impact of Risk Event

Lecture 111 Business Impacts From IT Risk

Lecture 112 Business Related IT Risk Types

Lecture 113 IT Project-Related Risk

Lecture 114 Risk Components— Inherent Risk

Lecture 115 Risk Components— Residual Risk

Lecture 116 Risk Components— Control Risk

Lecture 117 Risk Components— Detection Risk

Section 20: Business Risk and Threats Addressed By IT Resources

Lecture 118 Business Risk and Threats Addressed By IT Resources

Lecture 119 Identifying and Assessing IT Risk

Lecture 120 Identifying and Assessing IT Risk

Section 21: Methods For Describing IT Risk In Business Terms

Lecture 121 Methods For Describing IT Risk In Business Terms

Lecture 122 Methods For Describing IT Risk In Business Terms

Lecture 123 Methods For Describing IT Risk In Business Terms

Lecture 124 Methods For Describing IT Risk In Business Terms

Lecture 125 Methods For Describing IT Risk In Business Terms

Lecture 126 Methods For Describing IT Risk In Business Terms

Lecture 127 Methods For Describing IT Risk In Business Terms

Section 22: Case Study & Practice Questions

Lecture 128 Case Study or Exercise

Lecture 129 Practice Question 1

Lecture 130 Practice Question 2

Lecture 131 Practice Question 3

Lecture 132 Practice Question 4

Lecture 133 Practice Question 5

Section 23: Definitions and Acronyms

Lecture 134 Acronym Review

Lecture 135 Acronym Review—cont.

Lecture 136 Definition Review

Lecture 137 Definition Review

Lecture 138 Definition Review

Lecture 139 Definition Review

Section 24: Supplemental Exercises

Lecture 140 Domain 1 – Exercises

Section 25: Suggested Resources for Further Study

Lecture 141 Suggested Resources for Further Study

Lecture 142 End of C)ISRM Part II - Domain 1

Section 26: Part II Domain 2 - Risk Response

Lecture 143 Risk Response

Lecture 144 Section Overview

Lecture 145 Exam Relevance

Lecture 146 Domain 2 Learning Objectives

Lecture 147 Domain 2 Learning Objectives—cont

Section 27: Tasks and Knowledge Statements

Lecture 148 Task Statements

Lecture 149 Knowledge Statements

Section 28: Risk Response Process

Lecture 150 Risk Response Objectives

Lecture 151 The Risk Response Process

Lecture 152 The Risk Response Process—cont.

Lecture 153 The Risk Response Process—cont.

Lecture 154 Risk Response Options

Lecture 155 Risk Response Parameters

Lecture 156 Risk Tolerance and Risk Response Options

Lecture 157 Risk Response Prioritization Options

Lecture 158 Risk Mitigation Control Types

Lecture 159 Risk Response Prioritization Factors

Lecture 160 Risk Response Tracking, Integration and Implementation

Section 29: Risk Response Process Details

Lecture 161 Process Phases

Section 30: Phase 1 - Articulate Risk

Lecture 162 Phase 1 - Articulate Risk

Lecture 163 Phase 1 - Articulate Risk

Lecture 164 Phase 1 - Articulate Risk

Lecture 165 Phase 1 - Articulate Risk

Lecture 166 Phase 1 - Articulate Risk

Section 31: Phase 2 - Manage Risk

Lecture 167 Phase 2 - Manage Risk

Lecture 168 Phase 2 - Manage Risk

Lecture 169 Phase 2 - Manage Risk

Lecture 170 Phase 2 - Manage Risk

Lecture 171 Phase 2 - Manage Risk

Lecture 172 Phase 2 - Manage Risk

Section 32: Phase 3 - React To Risk Events

Lecture 173 Phase 3 - React To Risk Events

Lecture 174 Phase 3 - React To Risk Events

Lecture 175 Phase 3 - React To Risk Events

Lecture 176 Phase 3 - React To Risk Events

Lecture 177 Phase 3 - React To Risk Events

Section 33: Risk Response and Risk Management Frameworks

Lecture 178 Risk Management Frameworks

Lecture 179 Risk Management Frameworks

Lecture 180 Risk Management Frameworks

Lecture 181 Risk Management Frameworks

Lecture 182 Risk Management Frameworks

Lecture 183 Risk Management Frameworks

Section 34: Case Study and Practice Questions

Lecture 184 Sample Case Study or Exercise

Lecture 185 Practice Question 1

Lecture 186 Practice Question 2

Lecture 187 Practice Question 3

Lecture 188 Practice Question 4

Lecture 189 Practice Question 5

Section 35: Definitions and Acronyms

Lecture 190 Acronym Review

Lecture 191 Definition Review

Section 36: Supplemental Exercises

Lecture 192 Domain 2 – Exercises

Section 37: Suggested Resources for Further Study

Lecture 193 Suggested Resources for Further Study

Lecture 194 End of C)ISRM Part II - Domain 2

Section 38: Part II Domain 3 - Risk Monitoring

Lecture 195 Risk Monitoring

Lecture 196 Course Agenda

Lecture 197 Exam Relevance

Lecture 198 Learning Objectives

Lecture 199 Learning Objectives Cont.

Section 39: Tasks and Knowledge Statements

Lecture 200 Task Statements

Lecture 201 Knowledge Statements

Section 40: Essentials of Risk Monitoring

Lecture 202 Essentials

Section 41: Key Risk Indicators

Lecture 203 Risk Indicators

Lecture 204 Risk Indicator Selection Criteria

Lecture 205 Key Risk Indicators

Lecture 206 Risk Monitoring

Lecture 207 Risk Indicator Types and Parameters

Lecture 208 Risk Indicator Considerations

Lecture 209 Risk Indicator Considerations Con’t

Lecture 210 Criteria for KRI Selection

Lecture 211 Benefits of Selecting Right KRIs

Lecture 212 Benefits of Selecting Right KRIs

Lecture 213 Disadvantages of Wrong KRIs

Lecture 214 Changing KRIs

Lecture 215 KPIs

Lecture 216 KPIs

Lecture 217 KPIs

Section 42: Data Extraction, Aggregation, & Analysis

Lecture 218 Gathering KRI Data

Lecture 219 Steps to Data Gathering

Lecture 220 Gathering Requirements

Lecture 221 Data Access

Lecture 222 Data Preparation

Lecture 223 Data Validating Considerations

Lecture 224 Data Analysis

Lecture 225 Reporting and Corrective Actions

Lecture 226 Optimizing KRIs

Lecture 227 Optimizing KRIs—cont.

Section 43: Capability Maturity Models

Lecture 228 Use of Maturity Level Assessment

Lecture 229 Assessing Risk Maturity Levels

Lecture 230 Risk Management Capability Maturity Levels

Section 44: Changes to Threats, Vulnerabilities and Assets

Lecture 231 Changing Threat Levels

Lecture 232 Monitoring Changes in Threat Levels

Lecture 233 Measuring Changes in Threat Levels

Lecture 234 Responding to Changes in Threat Levels

Lecture 235 Threat Level Review

Lecture 236 Changes in Asset Value

Lecture 237 Maintain Asset Inventory

Section 45: Risk Reporting

Lecture 238 Risk Reporting

Lecture 239 Reporting Content

Lecture 240 Effective Reports

Lecture 241 Report Recommendations

Lecture 242 Possible Risk Report Recipients

Lecture 243 Periodic Reporting

Lecture 244 Reporting Topics

Lecture 245 Risk Reporting Techniques

Section 46: Case Study & Practice Questions

Lecture 246 Sample Case Study or Exercise

Lecture 247 Practice Question 1

Lecture 248 Practice Question 2

Lecture 249 Practice Question 3

Lecture 250 Practice Question 4

Section 47: Definitions and Acronyms

Lecture 251 Acronym Review

Lecture 252 Definition Review

Lecture 253 Domain 3 – Exercises

Section 48: Suggested Resources for Further Study

Lecture 254 Suggested Resources for Further Study

Lecture 255 End of C)ISRM Part II - Domain 3

Section 49: Part II Domain 4 - Information Systems Control Design and Implementation

Lecture 256 Information Systems Control Design and Implementation

Lecture 257 Section Overview

Lecture 258 Exam Relevance

Lecture 259 Domain 4 Learning Objectives

Section 50: Tasks and Knowledge Statements

Lecture 260 Task Statements

Lecture 261 Task Statements

Lecture 262 Knowledge Statements

Lecture 263 Knowledge Statements

Section 51: Control Design Considerations

Lecture 264 C)ISRM Involvement

Lecture 265 C)ISRM involvement—cont.

Lecture 266 Control Definition

Lecture 267 Control Categories

Lecture 268 Control Types and Effects

Lecture 269 Control Methods

Lecture 270 Control Design Considerations

Lecture 271 Control Strength

Lecture 272 Control Strength

Lecture 273 Control Costs and Benefits

Lecture 274 Potential Loss Measures

Lecture 275 Total Cost of Ownership For Controls

Section 52: System Development Life Cycle (SDLC)

Lecture 276 Role of the C)ISRM in SDLC

Lecture 277 Role of the C)ISRM in SDLC

Lecture 278 Role of the C)ISRM in SDLC

Lecture 279 The SDLC Process

Lecture 280 The Systems Development Life Cycle (SDLC)

Lecture 281 ‘Meets and Continues to Meet’

Lecture 282 SDLC

Lecture 283 SDLC Phases

Lecture 284 Addressing Risk Within the SDLC

Lecture 285 Business Risk versus Project Risk

Lecture 286 Understanding Project Risk

Lecture 287 Addressing Business Risk

Lecture 288 Understanding Business and Risk Requirements

Lecture 289 Understand Business Risk

Section 53: System Development Life Cycle (SDLC) Phases

Lecture 290 High Level SDLC Phases

Section 54: 1. Project Initiation (and Requirements Definition)

Lecture 291 Project Initiation

Lecture 292 Phase 1 – Project Initiation

Lecture 293 Phase 1 Tasks

Lecture 294 Task 1—Feasibility Study

Lecture 295 Feasibility Study Components

Lecture 296 Determining Feasibility

Lecture 297 Outcomes of the Feasibility Study

Lecture 298 Task 2—Define Requirement

Lecture 299 Requirement Progression

Lecture 300 Business Information Requirements (COBIT)

Lecture 301 Requirements Success Factors

Lecture 302 Task 3—Acquire Software “Options”

Lecture 303 Software Selection Criteria

Lecture 304 Software Acquisition

Lecture 305 Software Acquisition Process

Section 55: 2. Project Design and Development

Lecture 306 Leading Principles for Design and Implementation

Lecture 307 C)ISRM Responsibilities

Lecture 308 Key System Design Activities:

Lecture 309 Key System Design Activities—cont.

Lecture 310 Steps to Perform Phase 2

Lecture 311 Phase 2 - Project Design and Development

Section 56: 3. Project Testing

Lecture 312 System Testing

Lecture 313 Test Plans

Lecture 314 Project Testing

Lecture 315 Types of Tests

Lecture 316 UAT Requirements

Lecture 317 Certification and Accreditation

Lecture 318 Project Status Reports

Lecture 319 Phase 3 - Project Testing

Lecture 320 Testing Techniques

Lecture 321 Alpha Testing

Lecture 322 Beta Testing

Lecture 323 Function Validation

Lecture 324 Parallel Testing

Lecture 325 Pilot Testing

Lecture 326 Regression Testing

Lecture 327 Sociability Testing

Lecture 328 White Box Testing

Lecture 329 Verification and Validation

Section 57: 4. Project Implementation

Lecture 330 Phase 4 - Project Implementation

Lecture 331 Project Implementation

Lecture 332 Implementation Phases

Lecture 333 Phase 4 - Project Implementation

Lecture 334 End User Training Plans & Techniques

Lecture 335 Training Strategy

Lecture 336 Data Migration/Conversion Considerations

Lecture 337 Risks During Data Migration

Lecture 338 Data Conversion Steps

Lecture 339 Implementation Rollback

Lecture 340 Data Conversion Project Key Considerations

Lecture 341 Changeover Techniques

Lecture 342 Post-Implementation Review

Lecture 343 Performing Post-Implementation Review

Lecture 344 Measurements of Critical Success Factors

Lecture 345 Closing a Project

Section 58: Project Management and Controlling

Lecture 346 Project Management and Controlling

Section 59: Project Management Practices

Lecture 347 Project Management Tools and Techniques

Lecture 348 Project Management Elements

Lecture 349 Project Management Practices

Lecture 350 PERT chart and critical path

Lecture 351 PERT Attribute

Section 60: Case Study & Practice Questions

Lecture 352 Sample Case Study or Exercise

Lecture 353 Practice Question 1

Lecture 354 Practice Question 2

Lecture 355 Practice Question 3

Lecture 356 Practice Question 4

Lecture 357 Practice Question 5

Section 61: Definitions and Acronyms

Lecture 358 Acronym Review

Lecture 359 Definition Review

Lecture 360 Domain 4 – Exercises

Section 62: Suggested Resources for Further Study

Lecture 361 Suggested Resources for Further Study

Lecture 362 End of C)ISRM Part II - Domain 4

Students with an IT and IS learning background, wanting to adequately advance in skill and knowledge, as related to information system risk. This course is majorly for:,Individuals preparing for CISRM certification exam,Individuals seeking to learn Risk Management at a professional level