CRISC 2023: IT Governance
CRISC
| Intermediate
- 14 videos | 1h 22m 13s
- Includes Assessment
- Earns a Badge
Managing risk properly can result in reducing risk to acceptable levels for business objectives. IT governance principles guide activities related to reducing risk. In this course, explore IT security governance, its relationship to organizational security programs and project management, and how the COBIT framework applies to IT governance. Next, learn about organizational security policies, organizational culture and its relationship to security, and the importance of performing a gap analysis. Finally, examine supply chain security, personnel management, configuration and change management, IT audits, SLOs and SLAs, and chain of custody. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how an it maturity model provides an assessment as to whether technology is securely meeting business needs through a gap analysisIdentify how the control objectives for information and related technologies (cobit) framework applies to it governanceList various types of security policies and how they provide risk management guidanceOutline how to ensure effective security governance through security awareness and business executive involvementRecognize how gap analysis results serve as input for information security strategiesList security criteria when evaluating third-party vendors
-
Name personnel security issues related to hiring, background checks, and exit interviewsIdentify enterprise configuration management procedures and termsOutline enterprise change management procedures to ensure risks have been evaluatedState how various it system audits are conductedExplore the importance of service-level objectives (slos) and service-level agreements (slas)Recognize the legal importance of securing evidence both during and after collectionSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 18sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 55sAfter completing this video, you will be able to outline how an IT maturity model provides an assessment as to whether technology is securely meeting business needs through a gap analysis. FREE ACCESS
-
8m 51sUpon completion of this video, you will be able to identify how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance. FREE ACCESS
-
8m 17sIn this video, we will list various types of security policies and how they provide risk management guidance. FREE ACCESS
-
6m 4sAfter completing this video, you will be able to outline how to ensure effective security governance through security awareness and business executive involvement. FREE ACCESS
-
7m 2sIn this video, you will recognize how gap analysis results serve as input for information security strategies. FREE ACCESS
-
6m 45sUpon completion of this video, you will be able to list security criteria when evaluating third-party vendors. FREE ACCESS
-
6m 28sIn this video, we will name personnel security issues related to hiring, background checks, and exit interviews. FREE ACCESS
-
5m 55sAfter completing this video, you will be able to identify enterprise configuration management procedures and terms. FREE ACCESS
-
6m 19sUpon completion of this video, you will be able to outline enterprise change management procedures to ensure risks have been evaluated. FREE ACCESS
-
4m 42sIn this video, we will state how various IT system audits are conducted. FREE ACCESS
-
6m 18sIn this video, you will explore the importance of service-level objectives (SLOs) and service-level agreements (SLAs). FREE ACCESS
-
5m 20sAfter completing this video, you will be able to recognize the legal importance of securing evidence both during and after collection. FREE ACCESS
-
1mIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.