CourseInfo | SimpliTrain

CISRM-Certified Information Systems Risk Manager - ML

Learning plan iconE-Learning

Description

This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.

This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.

Lesson Id Title Description
1 The Big Picture: How Risk Management Relates to Risk Governance About the C)ISRM Exam
Exam Relevance
C)ISRM Review Course
Section Overview
Part 1 Learning Objectives
Risk Management
Section Topics
Overview of Risk Management
Risk
Risk and Opportunity Management
Responsibility vs. Accountability
Risk Management Roles and Responsibilities
Risk Management Frameworks, Standards and Practices
Relevance of Risk Management Frameworks, Standards and Practices
Frameworks
Standards
Practices
Essentials of Risk Governance
Relevance of Risk Governance
Overview of Risk Governance
Objectives of Risk Governance
Foundation of Risk Governance
Risk Appetite and Tolerance
Risk Appetite and Risk Tolerance
Risk Awareness and Communication
Key Concepts of Risk Governance
Risk Culture
Case Study & Practice Questions
Case Study
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Practice Question 5
Definitions and Acronyms
Acronym Review
Definition Review
Supplemental Exercises
Big Picture Exercises
Suggested Resources for Further Study
End of C)ISRM Part I - The Big Picture
2 Risk Identification, Assessment and Evaluation Risk Identification, Assessment and Evaluation
Section Overview
Exam Relevance
Domain 1 Learning Objectives
Tasks and Knowledge Statements
Task Statements
Knowledge Statements
Risk Identification, Assessment and Evaluation
The Process
Describing the Business Impact of IT Risk
IT Risk in the Risk Hierarchy
IT Risk Categories
High Level Process Phases
Generic Risk Scenarios
Risk Scenarios
Definition of Risk Scenario
Event Types
Purpose of Risk Scenarios
Risk Scenario Development
Risk Register
Risk Profile
Risk Scenario Development
Risk Scenario Components
Risk Scenario Development Enablers
Systemic, Contagious or Obscure Risk
Generic IT Risk Scenarios
Risk Factors
Definition of Risk Factor
Examples of Risk Factors
Risk Factors— External Environment
Risk Factors— Risk Management Capability
Risk Factors— IT Capability
Risk Factors— IT Related Business Capabilities
Risk Assessment Methods
Methods for Analyzing IT Risk
Likelihood and Impact
Risk Analysis Output
Risk Analysis Methods
Risk Analysis Methods— Quantitative
Risk Analysis Methods— Qualitative
Risk Analysis Methods— for HIGH impact risk types
Risk Analysis Methods
Risk Analysis Methods— Business Impact Analysis (BIA)
Methods for Assessing IT Risk
IT Risk Identification and Assessment
Identifying and Assessing IT Risk
Definitions
Adverse Impact of Risk Event
Business Impacts From IT Risk
Business Related IT Risk Types
IT Project-Related Risk
Risk Components— Inherent Risk
Risk Components— Residual Risk
Risk Components— Control Risk
Risk Components— Detection Risk
Business Risk and Threats Addressed By IT Resources
Identifying and Assessing IT Risk
Methods For Describing IT Risk In Business Term
s
Methods For Describing IT Risk In Business Terms
Case Study & Practice Questions
Case Study or Exercise
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Practice Question 5
Definitions and Acronyms
Acronym Review
Definition Review
Supplemental Exercises
Domain 1
– Exercises
Suggested Resources for Further Study
End of C)ISRM Part II
- Domain 1
3 Risk Response Section Overview
Exam Relevance
Domain 2 Learning Objectives
Tasks and Knowledge Statements
Task Statements
Knowledge Statements
Risk Response Process
Risk Response Objectives
The Risk Response Process
Risk Response Options
Risk Response Parameters
Risk Tolerance and Risk Response Options
Risk Response Prioritization Options
Risk Mitigation Control Types
Risk Response Prioritization Factors
Risk Response Tracking, Integration and Implementation
Risk Response Process Details
Process Phases
Phase 1
- Articulate Risk
Phase 2
- Manage Risk
Phase 3
- React To Risk Events
Risk Response and Risk Management Frameworks
Risk Management Frameworks
Case Study and Practice Questions
Sample Case Study or Exercise
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Practice Question 5
Definitions and Acronyms
Acronym Review
Definition Review
Supplemental Exercises
Domain 2
– Exercises
Suggested Resources for Further Study
End of C)ISRM Part II
4 Risk Monitoring Risk Monitoring
Course Agenda
Exam Relevance
Learning Objectives
Tasks and Knowledge Statements
Task Statements
Knowledge Statements
Essentials of Risk Monitoring
Essentials
Key Risk Indicators
Risk Indicators
Risk Indicator Selection Criteria
Risk Indicator Types and Parameters
Risk Indicator Considerations
Criteria for KRI Selection
Benefits of Selecting Right KRIs
Disadvantages of Wrong KRIs
Changing KRIs
KPIs
Data Extraction, Aggregation, & Analysis
Gathering KRI Data
Steps to Data Gathering
Gathering Requirements
Data Access
Data Preparation
Data Validating Considerations
Data Analysis
Reporting and Corrective Actions
Optimizing KRIs
Capability Maturity Models
Use of Maturity Level Assessment
Assessing Risk Maturity Levels
Risk Management Capability Maturity Levels
Changes to Threats, Vulnerabilities and Assets
Changing Threat Levels
Monitoring Changes in Threat Levels
Measuring Changes in Threat Levels
Responding to Changes in Threat Levels
Threat Level Review
Changes in Asset Value
Maintain Asset Inventory
Risk Reporting
Reporting Content
Effective Reports
Report Recommendations
Possible Risk Report Recipients
Periodic Reporting
Reporting Topics
Risk Reporting Techniques
Case Study & Practice Questions
Sample Case Study or Exercise
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Definitions and Acronyms
Acronym Review
Definition Review
Domain 3 – Exercises
Suggested Resources for Further Study
End of C)ISRM Part II - Domain 3
5 Information Systems Control Design and Implementation Information Systems Control Design and Implementation
Section Overview
Exam Relevance
Domain 4 Learning Objectives
Tasks and Knowledge Statements
Task Statements
Knowledge Statements
Control Design Considerations
C)ISRM Involvement
Control Definition
Control Categories
Control Types and Effects
Control Methods
Control Design Considerations
Control Strength
Control Costs and Benefits
Potential Loss Measures
Total Cost of Ownership For Controls
System Development Life Cycle (SDLC)
Role of the C)ISRM in SDLC
The SDLC Process
The Systems Development Life Cycle (SDLC)
‘Meets and Continues to Meet’
SDLC
SDLC Phases
Addressing Risk Within the SDLC
Business Risk versus Project Risk
Understanding Project Risk
Addressing Business Risk
Understanding Business and Risk Requirements
Understand Business Risk
System Development Life Cycle (SDLC) Phases
High Level SDLC Phases
1. Project Initiation (and Requirements Definition)
Project Initiation
Phase 1 – Project Initiation
Phase 1 Tasks
Task 1—Feasibility Study
Feasibility Study Components
Determining Feasibility
Outcomes of the Feasibility Study
Task 2—Define Requirement
Requirement Progression
Business Information Requirements (COBIT)
Requirements Success Factors
Task 3—Acquire Software “Options”
Software Selection Criteria
Software Acquisition
Software Acquisition Process
2. Project Design and Development
Leading Principles for Design and Implementation
C)ISRM Responsibilities
Key System Design Activities:
Steps to Perform Phase 2
Phase 2 - Project Design and Development
3. Project Testing
System Testing
Test Plans
Project Testing
Types of Tests
UAT Requirements
Certification and Accreditation
Project Status Reports
Phase 3 - Project Testing
Testing Techniques
Alpha Testing
Beta Testing
Function Validation
Parallel Testing
Pilot Testing
Regression Testing
Sociability Testing
White Box Testing
Verification and Validation
4. Project Implementation
Phase 4
- Project Implementation
Project Implementation
Implementation Phases
End User Training Plans & Techniques
Training Strategy
Data Migration/Conversion Considerations
Risks During Data Migration
Data Conversion Steps
Implementation Rollback
Data Conversion Project Key Considerations
Changeover Techniques
Post-Implementation Review
Performing Post-Implementation Review
Measurements of Critical Success Factors
Closing a Project
Project Management and Controlling
Project Management Practices
Project Management Tools and Techniques
Project Management Elements
Project Management Practices
PERT chart and critical path
PERT Attribute
Case Study & Practice Questions
Sample Case Study or Exercise
Practice Question 1
Practice Question 2
Practice Question 3
Practice Question 4
Practice Question 5
Definitions and Acronyms
Acronym Review
Definition Review
Domain 4
– Exercises
Suggested Resources for Further Study
End of C)ISRM Part II
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access