crisc

Certified in Risk and Information Systems Control

crisc

A Certified in Risk and Information Systems Control® (CRISC®) certification demonstrates your IT risk management expertise. By taking a proactive approach, you will learn how to enhance your organization’s business resilience, deliver stakeholder value and optimize risk management across the enterprise. As a CRISC, you will be ready to address emerging technology, including AI risk assessment and general best practices for risk management and mitigation related to AI data governance and ethics.

Course Content

Domain 1: Governance
Module 1.1: Organizational Governance
5 Topics
1 Quiz
Understanding Organizational Strategy, Goals, and Objectives
Roles and Responsibilities of the Three Lines of Defense Model
Developing and Implementing a Risk Governance Framework
Defining Risk Culture and Appetite Statements
Aligning Risk Management with Enterprise Architecture (EA)
CRISC Module 1.1: Organizational Governance
Module 1.2: Risk Strategy and Framework
5 Topics
1 Quiz
Components of a Risk Management Framework (e.g., ISO 31000, COSO)
Establishing and Communicating the Risk Vision and Strategy
Integrating Risk Management into Organizational Processes
Legal, Regulatory, and Contractual Requirements
Business Continuity Planning (BCP) and Resilience Strategy
CRISC Module 1.2: Risk Strategy and Framework
Module 1.3: Policies, Standards, and Procedures
5 Topics
1 Quiz
Developing and Maintaining Information Security Policies
Creating and Implementing Control Standards and Baselines
Documenting and Communicating Detailed Procedures
Policy Exception and Risk Acceptance Processes
Monitoring and Enforcing Policy Compliance
CRISC Module 1.3: Policies, Standards, and Procedures
Module 1.4: Business Impact Analysis (BIA)
5 Topics
1 Quiz
Identifying and Prioritizing Critical Business Processes
Determining Maximum Tolerable Downtime (MTD) and Recovery Objectives
Identifying Dependencies and Interdependencies
Quantifying Impact in Financial and Operational Terms
Using BIA Outputs to Inform Risk Treatment and Resource Allocation
CRISC Module 1.4: Business Impact Analysis (BIA)
Domain 2: IT Risk Assessment
Module 2.1: Risk Identification
5 Topics
1 Quiz
Threat Modeling and Threat Landscape Analysis
Vulnerability Identification and Management
IT Risk Scenario Development and Structuring
Asset Identification and Valuation (Data, Systems, People)
Risk Identification Techniques (Brainstorming, Delphi, Interviews)
CRISC Module 2.1: Risk Identification
Module 2.2: Risk Analysis and Evaluation
5 Topics
1 Quiz
Qualitative vs. Quantitative Risk Analysis Methods
Likelihood and Impact Assessment Criteria and Scales
Inherent Risk vs. Residual Risk
Risk Ranking, Heat Maps, and Prioritization
Using FAIR (Factor Analysis of Information Risk) for Quantification
CRISC Module 2.2: Risk Analysis and Evaluation
Module 2.3: Emerging Risk and Industry Trends
5 Topics
1 Quiz
Analyzing the Impact of Digital Transformation (Cloud, AI, IoT)
Third-Party and Supply Chain Risk Management
Cybersecurity Threats (Ransomware, Phishing, APTs)
Regulatory and Privacy Landscape (e.g., GDPR, CCPA)
Geopolitical and Environmental Risk Factors
CRISC Module 2.3: Emerging Risk and Industry Trends
Module 2.4: Risk Assessment Concepts
5 Topics
1 Quiz
The Risk Assessment Lifecycle
Risk Register Development and Maintenance
Control Assessment and Gap Analysis
Key Risk Indicators (KRIs) and Metrics
Data Analytics for Risk Assessment
CRISC Module 2.4: Risk Assessment Concepts
Domain 3: Risk Response and Reporting
Module 3.1: Risk Treatment / Response Options
5 Topics
1 Quiz
The Four Risk Response Strategies: Accept, Mitigate, Transfer, Avoid
Selecting the Optimal Risk Response Based on Cost-Benefit Analysis
Developing Risk Treatment Plans and Action Plans
Integrating Risk Responses with Business Processes
Managing and Monitoring Risk Treatment Progress
CRISC Module 3.1: Risk Treatment / Response Options
Module 3.2: Control Design and Implementation
5 Topics
1 Quiz
Categories of Controls (Preventive, Detective, Corrective)
Control Types (Administrative, Technical, Physical)
Designing Effective and Efficient Controls
Control Ownership and Implementation Lifecycle
Aligning Controls with Industry Frameworks (COBIT, NIST CSF)
CRISC Module 3.2: Control Design and Implementation
Module 3.3: Control Monitoring and Maintenance
5 Topics
1 Quiz
Continuous Control Monitoring Techniques and Tools
Control Testing and Assurance Frameworks
Managing Control Exceptions and Deficiencies
Control Automation and its Benefits
Maturity Models for Control Improvement
CRISC Module 3.3: Control Monitoring and Maintenance
Module 3.4: Risk and Control Reporting
5 Topics
1 Quiz
Identifying Target Audiences (Board, Management, Operational)
Developing Effective Risk Dashboards and Reports
Reporting on Risk Appetite Breaches and Top Risks
Communicating Control Effectiveness and Audit Findings
Data Visualization Techniques for Risk Reporting
CRISC Module 3.4: Risk and Control Reporting
Domain 4: Information Technology and Security
Module 4.1: IT Principles and Architecture
5 Topics
1 Quiz
Enterprise Architecture Frameworks (e.g., TOGAF, Zachman)
Cloud Computing Models (IaaS, PaaS, SaaS) and Associated Risks
Network Security Architecture (Zero Trust, Segmentation)
System Development Life Cycle (SDLC) and DevOps/DevSecOps
Data Governance, Classification, and Lifecycle Management
CRISC Module 4.1: IT Principles and Architecture
Module 4.2: IT Operations and Resilience
5 Topics
1 Quiz
IT Service Management (ITSM) and ITIL Key Practices
Physical and Environmental Security Controls
Backup and Recovery Strategies
Incident Response and Management Lifecycle
Patch and Vulnerability Management Programs
CRISC Module 4.2: IT Operations and Resilience
Module 4.3: Information Security Core Concepts
5 Topics
1 Quiz
The CIA Triad: Confidentiality, Integrity, and Availability
Identity and Access Management (IAM)
Cryptography and Public Key Infrastructure (PKI)
Network Security Controls (Firewalls, IDS/IPS)
Security Awareness, Training, and Education Programs
CRISC Module 4.3: Information Security Core Concepts
Module 4.4: Emerging Technology and Associated Risks
5 Topics
1 Quiz
Artificial Intelligence (AI) and Machine Learning (ML) Risks
Internet of Things (IoT) and Operational Technology (OT) Security
Blockchain and Distributed Ledger Technology Risks
Mobile and Remote Workforce Security Challenges
Managing the Risks of Robotic Process Automation (RPA)
CRISC Module 4.4: Emerging Technology and Associated Risks