We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Information Technology and Security ISACA® CRISC™

Kevin Henry

This course will teach you the principles of risk management in regard to information technology and security needed for the CRISC™ examination.

Read more

This course will teach you the principles of risk management in regard to information technology and security needed for the CRISC™ examination.

This certification prep course will help you prepare for the CRISC: Certified in Risk and Information Security Controls examination. In this course, Information Technology and Security ISACA® CRISC™, you’ll learn to identify and assess risk associated with information technology. First, you’ll explore security principles. Next, you’ll discover assessment of IT operations.. Finally, you’ll learn how to assess incident management and business continuity programs. When you’re finished with this course, you’ll have the skills and knowledge of IT and Security risk needed for the CRISC™ examination.

Enroll now

What's inside

Syllabus

Certification Prep Trailer
Information Technology Principles
Information Security Principles
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Kevin Henry, who are recognized for their work in the topic that the course teaches
Strong fit for professionals who want to prepare for the CRISC™ examination
Examines IT and security risk, which is highly relevant to the CRISC™ examination
Develops skills and knowledge of IT and security risk needed for the CRISC™ examination, which are core skills for CRISC™ professionals
This certification prep course will help you prepare for the examination, which is a leading certification in the field
This course explicitly requires that this course be taken in serial with others as part of a series

Save this course

Save Information Technology and Security ISACA® CRISC™ to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Information Technology and Security ISACA® CRISC™ with these activities:
Read Security Risk Management for the Enterprise by Patrick McDaniel
Gain a comprehensive understanding of risk management principles and practices by reading a leading text in the field.
Show steps
  • Purchase or borrow a copy of the book.
  • Read the book thoroughly, taking notes and highlighting key concepts.
  • Complete the exercises and review questions at the end of each chapter.
Review Information Systems Audit and Control principles
Review basic information systems audit and control principles to ensure a strong foundation for learning more advanced concepts covered in this course.
Show steps
  • Review a textbook or online resources that cover information systems audit principles.
  • Complete practice questions or exercises related to control principles and their application in IT systems.
Complete practice questions on IT security and risk assessment
Reinforce your understanding of key concepts and test your knowledge through practice questions and exercises.
Browse courses on IT Security
Show steps
  • Identify practice questions or online quizzes covering IT security and risk assessment.
  • Take the practice questions and review your answers, identifying areas where you need further study.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow a tutorial on IT risk assessment methodologies
Gain practical experience applying different IT risk assessment methodologies to better understand the process and its importance.
Show steps
  • Identify a reputable online tutorial or course that covers IT risk assessment methodologies.
  • Follow the tutorial, taking notes and practicing the techniques demonstrated.
Participate in a peer group to discuss risk management case studies
Engage with peers to analyze and discuss real-world risk management case studies, gaining insights and perspectives from different experiences.
Browse courses on Incident Management
Show steps
  • Join a peer group or online forum focused on risk management.
  • Participate in discussions, sharing your thoughts and experiences on case studies presented.
Develop a mock risk management plan for a specific IT system
Apply your knowledge of risk management by creating a comprehensive plan that addresses vulnerabilities and mitigation strategies for a particular IT system.
Browse courses on Risk Management Plan
Show steps
  • Select an IT system or application that you are familiar with.
  • Identify potential risks and threats to the system.
  • Develop mitigation strategies and controls to address the identified risks.
  • Document your findings and recommendations in a risk management plan.
Contribute to an open-source risk management tool or framework
Gain hands-on experience and contribute to the broader risk management community by participating in open-source projects related to risk assessment, monitoring, or mitigation.
Browse courses on Security Tools
Show steps
  • Identify an open-source risk management tool or framework that aligns with your interests.
  • Review the project's documentation and codebase.
  • Identify areas where you can contribute, such as bug fixes, feature enhancements, or documentation improvements.
  • Submit your contributions to the project's repository.

Career center

Learners who complete Information Technology and Security ISACA® CRISC™ will develop knowledge and skills that may be useful to these careers:
IT Auditor
An IT Auditor examines an organization's computer systems and networks to ensure that they are operating in accordance with established policies and procedures. The Information Technology and Security ISACA® CRISC™ course can help an IT Auditor in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in ensuring that an organizations' computer systems and networks are operating in accordance with established policies and procedures.
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer networks and systems. The Information Technology and Security ISACA® CRISC™ course will help you to prepare for the CRISC: Certified in Risk and Information Security Controls examination. By earning your CRISC, you will be able to demonstrate your knowledge of IT and Security risk.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains network security systems. The Information Technology and Security ISACA® CRISC™ course can help a Network Security Engineer in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in designing, implementing, and maintaining network security systems.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from security risks. The Information Technology and Security ISACA® CRISC™ course can help a Security Consultant in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in providing advice and guidance to organizations on how to protect their computer networks and systems from security risks.
Cloud Security Engineer
A Cloud Security Engineer designs, implements, and maintains security measures for cloud computing environments. The Information Technology and Security ISACA® CRISC™ course can help a Cloud Security Engineer in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in designing, implementing, and maintaining security measures for cloud computing environments.
Information Technology Auditor
An Information Technology Auditor examines an organization's computer systems and networks to ensure that they are operating in accordance with established policies and procedures. The Information Technology and Security ISACA® CRISC™ course can help an Information Technology Auditor in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in ensuring that an organizations' computer systems and networks are operating in accordance with established policies and procedures.
Information Security Manager
An Information Security Manager develops and implements security measures to protect an organization's computer networks and systems. The Information Technology and Security ISACA® CRISC™ course can help an Information Security Manager in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in developing and implementing security measures to protect an organization's computer networks and systems.
IT Risk Manager
An IT Risk Manager develops and implements strategies to protect an organization's computer networks and systems from security risks. The Information Technology and Security ISACA® CRISC™ course can help an IT Risk Manager in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in developing and implementing strategies to protect an organization's computer networks and systems from security risks.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for developing and implementing an organization's information security strategy. The Information Technology and Security ISACA® CRISC™ course can help a CISO in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in developing and implementing an organization's information security strategy.
IT Director
An IT Director plans and manages an organization's computer systems and networks. The Information Technology and Security ISACA® CRISC™ course can help an IT Director in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in planning and managing an organization's computer systems and networks.
Data Security Analyst
A Data Security Analyst protects an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. The Information Technology and Security ISACA® CRISC™ course can help a Data Security Analyst in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in protecting an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Technology Analyst
An Information Technology Analyst plans, implements, modifies, and supports computer hardware, software, and networks. This course, Information Technology and Security ISACA® CRISC™, will help you to demonstrate you have skills in the field of Information Technology. This course focuses on the principles of risk management in regard to information technology and security needed for the CRISC™ examination.
Cyber Security Analyst
A Cyber Security Analyst investigates and responds to security incidents and threats. The Information Technology and Security ISACA® CRISC™ course can help a Cyber Security Analyst in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in investigating and responding to security incidents and threats.
Business Continuity Planner
A Business Continuity Planner develops and implements plans to ensure that an organization can continue to operate in the event of a disaster. The Information Technology and Security ISACA® CRISC™ course can help a Business Continuity Planner in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in developing and implementing plans to ensure that an organization can continue to operate in the event of a disaster.
Disaster Recovery Planner
A Disaster Recovery Planner develops and implements plans to recover an organization's computer systems and networks in the event of a disaster. The Information Technology and Security ISACA® CRISC™ course can help a Disaster Recovery Planner in their career by teaching them the principles of risk management in regard to information technology and security. This knowledge will be helpful in developing and implementing plans to recover an organization's computer systems and networks in the event of a disaster.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Information Technology and Security ISACA® CRISC™.
This manual is the official study guide for the CRISC exam. It is an excellent resource for anyone preparing for the exam.
This classic text in the field of IT risk management. It would serve as a good supplement or even replacement to the information in the course.
Provides a practical guide to risk management. It would be a valuable resource for anyone who wants to learn more about how to manage risks.
Comprehensive guide to the CISSP exam. It would be a valuable resource for anyone who wants to learn more about information security.
Provides a concise overview of the ISO 27001 and ISO 27002 standards. It would be a valuable resource for anyone who wants to learn more about these standards.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Information Technology and Security ISACA® CRISC™.
IT Risk Assessment for ISACA® CRISC™
Most relevant
Risk Response and Reporting for ISACA® CRISC™
Most relevant
Governance for ISACA® CRISC™
Most relevant
Exam Review and Tips for ISACA® CRISC
Most relevant
Scope of the Information System for CGRC
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Selection and Approval of Security and Privacy Controls...
Most relevant
Information Security Risk Management for CISM®
Most relevant
Security and Risk Management: Concepts and Principles for...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser