Last updated 11/2020
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.35 GB | Duration: 4h 6m
Certification Course
What you’ll learn
Perform Risk Tracking, Integration, and Implementation
Understand the Benefits of Selecting Right KRIs
Understand the Role of the CISRM in SDLC
Understand the Methods for Describing IT Risk in Business Terms
Articulate Risk, Manage Risk, React to Risk event
Address Risk within the SDLC
Requirements
A background learning and practical experience in IT and IS will be required to actively participate and advance in this course.
Description
Do you have a burning desire to improve your information system risks technique? Then CISRM is the right choice as it is packed with such impactful topics as Risk Identification, Assessment, Evaluation, Response, Mentoring, and so much more.This course prepares you for the CISRM exam. For the duration of this course, participants will be exposed to knowledge-based training with relevant and equally advanced descriptions and illustrations of various information system risk-based elements, and how to overcome it all. There will also be practical cases to enhance your technique to becoming a management professional. Commence your journey into this next phase of action in your life and broaden your future career opportunity with CISRM. REGISTER NOW!
Overview
Section 1: Part I – The Big Picture: How Risk Management Relates to Risk Governance
Lecture 1 The Big Picture: How Risk Management Relates to Risk Governance
Lecture 2 About the C)ISRM Exam
Lecture 3 Exam Relevance
Lecture 4 About the C)ISRM Exam
Lecture 5 C)ISRM Review Course
Lecture 6 Section Overview
Lecture 7 Part 1 Learning Objectives
Section 2: Risk Management
Lecture 8 Section Topics
Lecture 9 Overview of Risk Management
Lecture 10 Risk
Lecture 11 Risk and Opportunity Management
Lecture 12 Responsibility vs. Accountability
Lecture 13 Responsibility vs. Accountability
Lecture 14 Risk Management Roles and Responsibilities
Section 3: Risk Management Frameworks, Standards and Practices
Lecture 15 Relevance of Risk Management Frameworks, Standards and Practices
Lecture 16 Frameworks
Lecture 17 Standards
Lecture 18 Practices
Section 4: Essentials of Risk Governance
Lecture 19 Relevance of Risk Governance
Lecture 20 Overview of Risk Governance
Lecture 21 Objectives of Risk Governance
Lecture 22 Foundation of Risk Governance
Lecture 23 Objectives of Risk Governance-cont.
Lecture 24 Objectives of Risk Governance-cont.
Lecture 25 Objectives of Risk Governance-cont.
Section 5: Risk Appetite and Tolerance
Lecture 26 Risk Appetite and Risk Tolerance
Lecture 27 Risk Appetite and Risk Tolerance-cont.
Lecture 28 Risk Appetite and Risk Tolerance-cont.
Section 6: Risk Awareness and Communication
Lecture 29 Risk Awareness and Communication
Lecture 30 Risk Awareness and Communication-cont.
Lecture 31 Risk Awareness and Communication-cont.
Lecture 32 Key Concepts of Risk Governance
Lecture 33 Key Concepts of Risk Governance
Section 7: Risk Culture
Lecture 34 Risk Culture-cont.
Lecture 35 Risk Culture
Section 8: Case Study & Practice Questions
Lecture 36 Case Study
Lecture 37 Practice Question 1
Lecture 38 Practice Question 2
Lecture 39 Practice Question 3
Lecture 40 Practice Question 4
Lecture 41 Practice Question 5
Section 9: Definitions and Acronyms
Lecture 42 Acronym Review
Lecture 43 Definition Review
Lecture 44 Definition Review
Section 10: Supplemental Exercises
Lecture 45 Big Picture Exercises
Section 11: Suggested Resources for Further Study
Lecture 46 Suggested Resources for Further Study
Lecture 47 End of C)ISRM Part I – The Big Picture
Section 12: Part II Domain 1 – Risk Identification, Assessment and Evaluation
Lecture 48 Risk Identification, Assessment and Evaluation
Lecture 49 Section Overview
Lecture 50 Exam Relevance
Lecture 51 Domain 1 Learning Objectives
Lecture 52 Domain 1 Learning Objectives-cont.
Section 13: Tasks and Knowledge Statements
Lecture 53 Task Statements
Lecture 54 Knowledge Statements
Lecture 55 Knowledge Statements-cont.
Lecture 56 Knowledge Statements
Section 14: Risk Identification, Assessment and Evaluation
Lecture 57 The Process
Lecture 58 The Process-cont.
Lecture 59 Describing the Business Impact of IT Risk
Lecture 60 Describing the Business Impact of IT Risk
Lecture 61 Describing the Business Impact of IT Risk
Lecture 62 IT Risk in the Risk Hierarchy
Lecture 63 IT Risk Categories
Lecture 64 High Level Process Phases
Section 15: Generic Risk Scenarios
Lecture 65 Risk Scenarios
Lecture 66 Definition of Risk Scenario
Lecture 67 Event Types
Lecture 68 Purpose of Risk Scenarios
Section 16: Risk Scenario Development
Lecture 69 Risk Scenario Development
Lecture 70 Risk Scenario Development-cont.
Lecture 71 Risk Scenario Development-cont.
Lecture 72 Risk Register
Lecture 73 Risk Profile
Lecture 74 Risk Scenario Development
Lecture 75 Risk Scenario Components
Lecture 76 Risk Scenario Development
Lecture 77 Risk Scenario Development-cont
Lecture 78 Risk Scenario Development Enablers
Lecture 79 Systemic, Contagious or Obscure Risk
Lecture 80 Generic IT Risk Scenarios
Lecture 81 Generic IT Risk Scenarios-cont.
Section 17: Risk Factors
Lecture 82 Definition of Risk Factor
Lecture 83 Examples of Risk Factors
Lecture 84 Risk Factors —cont.
Lecture 85 Risk Factors- External Environment
Lecture 86 Risk Factors- External Environment-cont.
Lecture 87 Risk Factors- Internal Environment
Lecture 88 Risk Factors- Internal Environment
Lecture 89 Risk Factors- Internal Environment
Lecture 90 Risk Factors- Internal Environment
Lecture 91 Risk Factors- Internal Environment-cont.
Lecture 92 Risk Factors- Internal Environment-cont.
Lecture 93 Risk Factors- Internal Environment-cont.
Lecture 94 Risk Factors- Risk Management Capability
Lecture 95 Risk Factors- IT Capability
Lecture 96 Risk Factors- IT Related Business Capabilities
Section 18: Risk Assessment Methods
Lecture 97 Methods for Analyzing IT Risk
Lecture 98 Likelihood and Impact
Lecture 99 Risk Analysis Output
Lecture 100 Risk Analysis Output
Lecture 101 Risk Analysis Methods
Lecture 102 Risk Analysis Methods- Quantitative
Lecture 103 Risk Analysis Methods- Qualitative
Lecture 104 Risk Analysis Methods- for HIGH impact risk types
Lecture 105 Risk Analysis Methods
Lecture 106 Risk Analysis Methods- Business Impact Analysis (BIA)
Lecture 107 Methods for Assessing IT Risk
Section 19: IT Risk Identification and Assessment
Lecture 108 Identifying and Assessing IT Risk
Lecture 109 Definitions
Lecture 110 Adverse Impact of Risk Event
Lecture 111 Business Impacts From IT Risk
Lecture 112 Business Related IT Risk Types
Lecture 113 IT Project-Related Risk
Lecture 114 Risk Components- Inherent Risk
Lecture 115 Risk Components- Residual Risk
Lecture 116 Risk Components- Control Risk
Lecture 117 Risk Components- Detection Risk
Section 20: Business Risk and Threats Addressed By IT Resources
Lecture 118 Business Risk and Threats Addressed By IT Resources
Lecture 119 Identifying and Assessing IT Risk
Lecture 120 Identifying and Assessing IT Risk
Section 21: Methods For Describing IT Risk In Business Terms
Lecture 121 Methods For Describing IT Risk In Business Terms
Lecture 122 Methods For Describing IT Risk In Business Terms
Lecture 123 Methods For Describing IT Risk In Business Terms
Lecture 124 Methods For Describing IT Risk In Business Terms
Lecture 125 Methods For Describing IT Risk In Business Terms
Lecture 126 Methods For Describing IT Risk In Business Terms
Lecture 127 Methods For Describing IT Risk In Business Terms
Section 22: Case Study & Practice Questions
Lecture 128 Case Study or Exercise
Lecture 129 Practice Question 1
Lecture 130 Practice Question 2
Lecture 131 Practice Question 3
Lecture 132 Practice Question 4
Lecture 133 Practice Question 5
Section 23: Definitions and Acronyms
Lecture 134 Acronym Review
Lecture 135 Acronym Review-cont.
Lecture 136 Definition Review
Lecture 137 Definition Review
Lecture 138 Definition Review
Lecture 139 Definition Review
Section 24: Supplemental Exercises
Lecture 140 Domain 1 – Exercises
Section 25: Suggested Resources for Further Study
Lecture 141 Suggested Resources for Further Study
Lecture 142 End of C)ISRM Part II – Domain 1
Section 26: Part II Domain 2 – Risk Response
Lecture 143 Risk Response
Lecture 144 Section Overview
Lecture 145 Exam Relevance
Lecture 146 Domain 2 Learning Objectives
Lecture 147 Domain 2 Learning Objectives-cont
Section 27: Tasks and Knowledge Statements
Lecture 148 Task Statements
Lecture 149 Knowledge Statements
Section 28: Risk Response Process
Lecture 150 Risk Response Objectives
Lecture 151 The Risk Response Process
Lecture 152 The Risk Response Process-cont.
Lecture 153 The Risk Response Process-cont.
Lecture 154 Risk Response Options
Lecture 155 Risk Response Parameters
Lecture 156 Risk Tolerance and Risk Response Options
Lecture 157 Risk Response Prioritization Options
Lecture 158 Risk Mitigation Control Types
Lecture 159 Risk Response Prioritization Factors
Lecture 160 Risk Response Tracking, Integration and Implementation
Section 29: Risk Response Process Details
Lecture 161 Process Phases
Section 30: Phase 1 – Articulate Risk
Lecture 162 Phase 1 – Articulate Risk
Lecture 163 Phase 1 – Articulate Risk
Lecture 164 Phase 1 – Articulate Risk
Lecture 165 Phase 1 – Articulate Risk
Lecture 166 Phase 1 – Articulate Risk
Section 31: Phase 2 – Manage Risk
Lecture 167 Phase 2 – Manage Risk
Lecture 168 Phase 2 – Manage Risk
Lecture 169 Phase 2 – Manage Risk
Lecture 170 Phase 2 – Manage Risk
Lecture 171 Phase 2 – Manage Risk
Lecture 172 Phase 2 – Manage Risk
Section 32: Phase 3 – React To Risk Events
Lecture 173 Phase 3 – React To Risk Events
Lecture 174 Phase 3 – React To Risk Events
Lecture 175 Phase 3 – React To Risk Events
Lecture 176 Phase 3 – React To Risk Events
Lecture 177 Phase 3 – React To Risk Events
Section 33: Risk Response and Risk Management Frameworks
Lecture 178 Risk Management Frameworks
Lecture 179 Risk Management Frameworks
Lecture 180 Risk Management Frameworks
Lecture 181 Risk Management Frameworks
Lecture 182 Risk Management Frameworks
Lecture 183 Risk Management Frameworks
Section 34: Case Study and Practice Questions
Lecture 184 Sample Case Study or Exercise
Lecture 185 Practice Question 1
Lecture 186 Practice Question 2
Lecture 187 Practice Question 3
Lecture 188 Practice Question 4
Lecture 189 Practice Question 5
Section 35: Definitions and Acronyms
Lecture 190 Acronym Review
Lecture 191 Definition Review
Section 36: Supplemental Exercises
Lecture 192 Domain 2 – Exercises
Section 37: Suggested Resources for Further Study
Lecture 193 Suggested Resources for Further Study
Lecture 194 End of C)ISRM Part II – Domain 2
Section 38: Part II Domain 3 – Risk Monitoring
Lecture 195 Risk Monitoring
Lecture 196 Course Agenda
Lecture 197 Exam Relevance
Lecture 198 Learning Objectives
Lecture 199 Learning Objectives Cont.
Section 39: Tasks and Knowledge Statements
Lecture 200 Task Statements
Lecture 201 Knowledge Statements
Section 40: Essentials of Risk Monitoring
Lecture 202 Essentials
Section 41: Key Risk Indicators
Lecture 203 Risk Indicators
Lecture 204 Risk Indicator Selection Criteria
Lecture 205 Key Risk Indicators
Lecture 206 Risk Monitoring
Lecture 207 Risk Indicator Types and Parameters
Lecture 208 Risk Indicator Considerations
Lecture 209 Risk Indicator Considerations Con’t
Lecture 210 Criteria for KRI Selection
Lecture 211 Benefits of Selecting Right KRIs
Lecture 212 Benefits of Selecting Right KRIs
Lecture 213 Disadvantages of Wrong KRIs
Lecture 214 Changing KRIs
Lecture 215 KPIs
Lecture 216 KPIs
Lecture 217 KPIs
Section 42: Data Extraction, Aggregation, & Analysis
Lecture 218 Gathering KRI Data
Lecture 219 Steps to Data Gathering
Lecture 220 Gathering Requirements
Lecture 221 Data Access
Lecture 222 Data Preparation
Lecture 223 Data Validating Considerations
Lecture 224 Data Analysis
Lecture 225 Reporting and Corrective Actions
Lecture 226 Optimizing KRIs
Lecture 227 Optimizing KRIs-cont.
Section 43: Capability Maturity Models
Lecture 228 Use of Maturity Level Assessment
Lecture 229 Assessing Risk Maturity Levels
Lecture 230 Risk Management Capability Maturity Levels
Section 44: Changes to Threats, Vulnerabilities and Assets
Lecture 231 Changing Threat Levels
Lecture 232 Monitoring Changes in Threat Levels
Lecture 233 Measuring Changes in Threat Levels
Lecture 234 Responding to Changes in Threat Levels
Lecture 235 Threat Level Review
Lecture 236 Changes in Asset Value
Lecture 237 Maintain Asset Inventory
Section 45: Risk Reporting
Lecture 238 Risk Reporting
Lecture 239 Reporting Content
Lecture 240 Effective Reports
Lecture 241 Report Recommendations
Lecture 242 Possible Risk Report Recipients
Lecture 243 Periodic Reporting
Lecture 244 Reporting Topics
Lecture 245 Risk Reporting Techniques
Section 46: Case Study & Practice Questions
Lecture 246 Sample Case Study or Exercise
Lecture 247 Practice Question 1
Lecture 248 Practice Question 2
Lecture 249 Practice Question 3
Lecture 250 Practice Question 4
Section 47: Definitions and Acronyms
Lecture 251 Acronym Review
Lecture 252 Definition Review
Lecture 253 Domain 3 – Exercises
Section 48: Suggested Resources for Further Study
Lecture 254 Suggested Resources for Further Study
Lecture 255 End of C)ISRM Part II – Domain 3
Section 49: Part II Domain 4 – Information Systems Control Design and Implementation
Lecture 256 Information Systems Control Design and Implementation
Lecture 257 Section Overview
Lecture 258 Exam Relevance
Lecture 259 Domain 4 Learning Objectives
Section 50: Tasks and Knowledge Statements
Lecture 260 Task Statements
Lecture 261 Task Statements
Lecture 262 Knowledge Statements
Lecture 263 Knowledge Statements
Section 51: Control Design Considerations
Lecture 264 C)ISRM Involvement
Lecture 265 C)ISRM involvement-cont.
Lecture 266 Control Definition
Lecture 267 Control Categories
Lecture 268 Control Types and Effects
Lecture 269 Control Methods
Lecture 270 Control Design Considerations
Lecture 271 Control Strength
Lecture 272 Control Strength
Lecture 273 Control Costs and Benefits
Lecture 274 Potential Loss Measures
Lecture 275 Total Cost of Ownership For Controls
Section 52: System Development Life Cycle (SDLC)
Lecture 276 Role of the C)ISRM in SDLC
Lecture 277 Role of the C)ISRM in SDLC
Lecture 278 Role of the C)ISRM in SDLC
Lecture 279 The SDLC Process
Lecture 280 The Systems Development Life Cycle (SDLC)
Lecture 281 ‘Meets and Continues to Meet’
Lecture 282 SDLC
Lecture 283 SDLC Phases
Lecture 284 Addressing Risk Within the SDLC
Lecture 285 Business Risk versus Project Risk
Lecture 286 Understanding Project Risk
Lecture 287 Addressing Business Risk
Lecture 288 Understanding Business and Risk Requirements
Lecture 289 Understand Business Risk
Section 53: System Development Life Cycle (SDLC) Phases
Lecture 290 High Level SDLC Phases
Section 54: 1. Project Initiation (and Requirements Definition)
Lecture 291 Project Initiation
Lecture 292 Phase 1 – Project Initiation
Lecture 293 Phase 1 Tasks
Lecture 294 Task 1-Feasibility Study
Lecture 295 Feasibility Study Components
Lecture 296 Determining Feasibility
Lecture 297 Outcomes of the Feasibility Study
Lecture 298 Task 2-Define Requirement
Lecture 299 Requirement Progression
Lecture 300 Business Information Requirements (COBIT)
Lecture 301 Requirements Success Factors
Lecture 302 Task 3-Acquire Software “Options”
Lecture 303 Software Selection Criteria
Lecture 304 Software Acquisition
Lecture 305 Software Acquisition Process
Section 55: 2. Project Design and Development
Lecture 306 Leading Principles for Design and Implementation
Lecture 307 C)ISRM Responsibilities
Lecture 308 Key System Design Activities
Lecture 309 Key System Design Activities-cont.
Lecture 310 Steps to Perform Phase 2
Lecture 311 Phase 2 – Project Design and Development
Section 56: 3. Project Testing
Lecture 312 System Testing
Lecture 313 Test Plans
Lecture 314 Project Testing
Lecture 315 Types of Tests
Lecture 316 UAT Requirements
Lecture 317 Certification and Accreditation
Lecture 318 Project Status Reports
Lecture 319 Phase 3 – Project Testing
Lecture 320 Testing Techniques
Lecture 321 Alpha Testing
Lecture 322 Beta Testing
Lecture 323 Function Validation
Lecture 324 Parallel Testing
Lecture 325 Pilot Testing
Lecture 326 Regression Testing
Lecture 327 Sociability Testing
Lecture 328 White Box Testing
Lecture 329 Verification and Validation
Section 57: 4. Project Implementation
Lecture 330 Phase 4 – Project Implementation
Lecture 331 Project Implementation
Lecture 332 Implementation Phases
Lecture 333 Phase 4 – Project Implementation
Lecture 334 End User Training Plans & Techniques
Lecture 335 Training Strategy
Lecture 336 Data Migration/Conversion Considerations
Lecture 337 Risks During Data Migration
Lecture 338 Data Conversion Steps
Lecture 339 Implementation Rollback
Lecture 340 Data Conversion Project Key Considerations
Lecture 341 Changeover Techniques
Lecture 342 Post-Implementation Review
Lecture 343 Performing Post-Implementation Review
Lecture 344 Measurements of Critical Success Factors
Lecture 345 Closing a Project
Section 58: Project Management and Controlling
Lecture 346 Project Management and Controlling
Section 59: Project Management Practices
Lecture 347 Project Management Tools and Techniques
Lecture 348 Project Management Elements
Lecture 349 Project Management Practices
Lecture 350 PERT chart and critical path
Lecture 351 PERT Attribute
Section 60: Case Study & Practice Questions
Lecture 352 Sample Case Study or Exercise
Lecture 353 Practice Question 1
Lecture 354 Practice Question 2
Lecture 355 Practice Question 3
Lecture 356 Practice Question 4
Lecture 357 Practice Question 5
Section 61: Definitions and Acronyms
Lecture 358 Acronym Review
Lecture 359 Definition Review
Lecture 360 Domain 4 – Exercises
Section 62: Suggested Resources for Further Study
Lecture 361 Suggested Resources for Further Study
Lecture 362 End of C)ISRM Part II – Domain 4
Students with an IT and IS learning background, wanting to adequately advance in skill and knowledge, as related to information system risk. This course is majorly for:,Individuals preparing for CISRM certification exam,Individuals seeking to learn Risk Management at a professional level
Homepage
https://www.udemy.com/course/certified-information-systems-risk-manager-cisrm/
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM