CRISC 2023: IT Governance

CRISC    |    Intermediate
  • 14 videos | 1h 22m 13s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Managing risk properly can result in reducing risk to acceptable levels for business objectives. IT governance principles guide activities related to reducing risk. In this course, explore IT security governance, its relationship to organizational security programs and project management, and how the COBIT framework applies to IT governance. Next, learn about organizational security policies, organizational culture and its relationship to security, and the importance of performing a gap analysis. Finally, examine supply chain security, personnel management, configuration and change management, IT audits, SLOs and SLAs, and chain of custody. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how an it maturity model provides an assessment as to whether technology is securely meeting business needs through a gap analysis
    Identify how the control objectives for information and related technologies (cobit) framework applies to it governance
    List various types of security policies and how they provide risk management guidance
    Outline how to ensure effective security governance through security awareness and business executive involvement
    Recognize how gap analysis results serve as input for information security strategies
    List security criteria when evaluating third-party vendors
  • Name personnel security issues related to hiring, background checks, and exit interviews
    Identify enterprise configuration management procedures and terms
    Outline enterprise change management procedures to ensure risks have been evaluated
    State how various it system audits are conducted
    Explore the importance of service-level objectives (slos) and service-level agreements (slas)
    Recognize the legal importance of securing evidence both during and after collection
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 18s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 55s
    After completing this video, you will be able to outline how an IT maturity model provides an assessment as to whether technology is securely meeting business needs through a gap analysis. FREE ACCESS
  • Locked
    3.  IT Governance Using the COBIT Framework
    8m 51s
    Upon completion of this video, you will be able to identify how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance. FREE ACCESS
  • Locked
    4.  Organizational Security Policies
    8m 17s
    In this video, we will list various types of security policies and how they provide risk management guidance. FREE ACCESS
  • Locked
    5.  Organizational Culture and Security
    6m 4s
    After completing this video, you will be able to outline how to ensure effective security governance through security awareness and business executive involvement. FREE ACCESS
  • Locked
    6.  Perform a Gap Analysis
    7m 2s
    In this video, you will recognize how gap analysis results serve as input for information security strategies. FREE ACCESS
  • Locked
    7.  Supply Chain Security
    6m 45s
    Upon completion of this video, you will be able to list security criteria when evaluating third-party vendors. FREE ACCESS
  • Locked
    8.  Personnel Management
    6m 28s
    In this video, we will name personnel security issues related to hiring, background checks, and exit interviews. FREE ACCESS
  • Locked
    9.  Configuration Management
    5m 55s
    After completing this video, you will be able to identify enterprise configuration management procedures and terms. FREE ACCESS
  • Locked
    10.  Change Management
    6m 19s
    Upon completion of this video, you will be able to outline enterprise change management procedures to ensure risks have been evaluated. FREE ACCESS
  • Locked
    11.  IT Auditing
    4m 42s
    In this video, we will state how various IT system audits are conducted. FREE ACCESS
  • Locked
    12.  Exploring the Importance of SLOs and SLAs
    6m 18s
    In this video, you will explore the importance of service-level objectives (SLOs) and service-level agreements (SLAs). FREE ACCESS
  • Locked
    13.  Chain of Custody
    5m 20s
    After completing this video, you will be able to recognize the legal importance of securing evidence both during and after collection. FREE ACCESS
  • Locked
    14.  Course Summary
    1m
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 1717 users Rating 4.5 of 1717 users (1717)
Rating 4.4 of 3271 users Rating 4.4 of 3271 users (3271)