This 3-day accelerated CRISC course will improve your understanding of IT risk management, and its impact on your business. Our expert instructors will take you through how to design, implement, monitor and maintain risk-based, efficient and effective information systems controls.
You'll be immersed in the curriculum, training up to 10 hours a day, through our unique Lecture | Lab | Review technique. By the end of the course, you'll gain knowledge of enterprise risk, and know various information systems controls to mitigate this risk.
You'll also learn:
- Risk identification, assessment and evaluation
- Risk response
- Risk monitoring
- Information systems control design and implementation
- Information systems control monitoring and maintenance
Firebrand is an official ISACA ATO, which means you'll have access to official ISACA courseware. You'll prepare for the CRISC exam and receive a CRISC exam voucher, that can be used at your nearest test centre.
Firebrand is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students.
See prices now to find out how much you could save when you train at twice the speed.
سبعة أسباب تدعو إلى ضرورة التحاقك بدورة CRISC التدريبية مع فايربراند للتدريب
- سوف تحصل على شهادة CRISC المعتمدة معنا خلال ٣ أيام. وسوف يتم تدريبك على CRISC خلال فترة قياسية
- دورتنا التدريبية CRISC شاملة جامعة. وبدفع الرسوم مرة واحدة فقط سوف يتم تغطية كل مواد الدورة والامتحانات والإقامة والوجبات الغذائية. لا توجد مصاريف إضافية خفية
- النجاح في امتحان CRISC من المرة الأولى أو سيتم تدريبك مرة أخرى مجاناً. هذا هو ضماننا. إننا على يقين أنك سوف تنجح في الدورة من المرة الأولى. ولكن إذا لم يحالفك الحظ ، عد مرة أخرى خلال سنة وستدفع فقط نظير الإقامة والامتحانات. وكل شيء آخر سيكون مجاناً
- سوف تتعلم المزيد من CRISC. إن يوم الدراسة مع مراكز التدريب التقليدي عادة ما يكون من الساعة التاسعة صباحاً وحتى الساعة الخامسة بعد الظهر مع فترات إضاعة للوقت أما مع فايربراند للتدريب فسوف تحصل على فترة تعلم مكثفة لمدة لا تقل عن ١٢ ساعة في اليوم مع مدربك
- سوف تتعلم CRISC بسرعة أكثر. وبالتأكيد سوف يتوفر لديك نمط تعليم مختلف عن أولئك الموجودين حولك. فإننا نجمع بين الطريقة المرئية والسمعية والتجريبية لتقديم المادة بطريقة تضمن تعلمك بسرعة وسهولة أكبر
- سوف تدرس CRISC مع الأفضل. فلقد حصلنا على جائزة "من أفضل شركات التدريب" في العالم في تدريبات تقنية المعلومات لثلاث مرات وهذا رقم قياسي. وبالإضافة إلى الفوز بالعديد من الجوائز الأخرى، فلقد قمنا بتدريب واعتماد ٣٠٫٠٠٠ مهني ولدينا شركاء مع كل الأسماء الكبرى في عالم الشركات
- سوف نُقدم ما هو أكثر من مواد الدراسة في CRISC. إننا نستخدم التمرينات العملية للتأكد من تطبيقك لمعرفتك الجديدة في أجواء العمل. ويستخدم مدربونا العروض التجريبية والتجربة في العالم الواقعي لجعل يومك مثيراً للاهتمام حيث تستمتع بالمشاركة
فكر أن تكون جاهزاً للدورة التدريبية ؟ التحق باختبار تمرين مجاني لتقييم معرفتك
Think you are ready for the course? Take a FREE practice test to assess your knowledge!
Other accelerated training providers rely heavily on lecture and independent self-testing and study.
Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.
Firebrand Training provides instruction to meet every learning need:
- Intensive group instruction
- One-on-one instruction attention
- Hands-on labs
- Lab partner and group exercises
- Question and answer drills
- Independent study
This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.
Domain 1—Risk Identification
Identify the universe of IT risk to contribute to the execution of the IT risk management strategy in support of business objectives and in alignment with the enterprise risk management (ERM) strategy.
- 1.1 Collect and review information, including existing documentation, regarding the organization’s internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization’s business objectives and operations.
- 1.2 Identify potential threats and vulnerabilities to the organization’s people, processes and technology to enable IT risk analysis.
- 1.3 Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.
- 1.4 Identify key stakeholders for IT risk scenarios to help establish accountability.
- 1.5 Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.
- 1.6 Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.
- 1.7 Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.
Domain 2—IT Risk Assessment
Analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision making.
- 2.1 Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.
- 2.2 Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.
- 2.3 Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.
- 2.4 Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.
- 2.5 Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.
- 2.6 Update the risk register with the results of the risk assessment.
Domain 3—Risk Response and Mitigation
Determine risk response options and evaluate their efficiency and effectiveness to manage risk in alignment with business objectives.
- 3.1 Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.
- 3.2 Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).
- 3.3 Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.
- 3.4 Ensure that control ownership is assigned to establish clear lines of accountability.
- 3.5 Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.
- 3.6 Update the risk register to reflect changes in risk and management’s risk response.
- 3.7 Validate that risk responses have been executed according to the risk action plans.
Domain 4—Risk and Control Monitoring and Reporting
Continuously monitor and report on IT risk and controls to relevant stakeholders to ensure the continued efficiency and effectiveness of the IT risk management strategy and its alignment to business objectives.
- 4.1 Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.
- 4.2 Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.
- 4.3 Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.
- 4.4 Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.
- 4.5 Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.
- 4.6 Review the results of control assessments to determine the effectiveness of the control environment.
- 4.7 Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making.
CRISC Knowledge Statements
- 1. Laws, regulations, standards and compliance requirements
- 2. Industry trends and emerging technologies
- 3. Enterprise systems architecture (e.g., platforms, networks, applications, databases and operating systems)
- 4. Business goals and objectives
- 5. Contractual requirements with customers and third-party service providers
- 6. Threats and vulnerabilities related to:
- 6.1. Business processes and initiatives
- 6.2. Third-party management
- 6.3. Data management
- 6.4. Hardware, software and appliances
- 6.5. The system development life cycle (SDLC)
- 6.6. Project and program management
- 6.7. Business continuity and disaster recovery management (DRM)
- 6.8. Management of IT operations
- 6.9. Emerging technologies
- 7. Methods to identify risk
- 8. Risk scenario development tools and techniques
- 9. Risk identification and classification standards, and frameworks
- 10. Risk events/incident concepts (e.g., contributing conditions, lessons learned, loss result)
- 11. Elements of a risk register
- 12. Risk appetite and tolerance
- 13. Risk analysis methodologies (quantitative and qualitative)
- 14. Organisational structures
- 15. Organisational culture, ethics and behavior
- 16. Organisational assets (e.g., people, technology, data, trademarks, intellectual property) and business processes, including enterprise risk management (ERM)
- 17. Organisational policies and standards
- 18. Business process review tools and techniques
- 19. Analysis techniques (e.g., root cause, gap, cost-benefit, return on investment [ROI])
- 20. Capability assessment models and improvement techniques and strategies
- 21. Data analysis, validation and aggregation techniques (e.g., trend analysis, modeling)
- 22. Data collection and extraction tools and techniques
- 23. Principles of risk and control ownership
- 24. Characteristics of inherent and residual risk
- 25. Exception management practices
- 26. Risk assessment standards, frameworks and techniques
- 27. Risk response options (i.e., accept, mitigate, avoid, transfer) and criteria for selection
- 28. Information security concepts and principles, including confidentiality, integrity and availability of information
- 29. Systems control design and implementation, including testing methodologies and practices
- 30. The impact of emerging technologies on design and implementation of controls
- 31. Requirements, principles, and practices for educating and training on risk and control activities
- 32. key risk indicators (KRIs)
- 33. Risk monitoring standards and frameworks
- 34. Risk monitoring tools and techniques
- 35. Risk reporting tools and techniques
- 36. IT risk management best practices
- 37. Key performance indicator (KPIs)
- 38. Control types, standards, and frameworks
- 39. Control monitoring and reporting tools and techniques
- 40. Control assessment types (e.g., self-assessments, audits, vulnerability assessments, penetration tests, third-party assurance)
- 41. Control activities, objectives, practices and metrics related to:
- 41.1. Business processes
- 41.2. Information security, including technology certification and accreditation practices
- 41.3. Third-party management, including service delivery
- 41.4. Data management
- 41.5. The system development life cycle (SDLC)
- 41.6. Project and program management
- 41.7. Business continuity and disaster recovery management (DRM)
- 41.8. IT operations management
- 41.9. The information systems architecture (e.g., platforms, networks, applications, databases and operating systems)
See Exam Track...
The CRISC exam measures your knowledge of the four domains:
- Domain 1— Risk Identification (27%)
- Domain 2— Risk Assessment (28%)
- Domain 3— Risk Response and Mitigation (23%)
- Domain 4— Risk and Control Monitoring and Reporting (22%)
Firebrand is an official ISACA ATO, which means you'll have access to official ISACA courseware. You'll also receive a CRISC exam voucher, that can be used at your nearest test centre.
ISACA Exam Testing Windows
If you choose to sit the exam, there will be three testing windows of 16-week durations. Your accelerated course will take place within one of these testing windows.
Next testing window: 1 February - 24 May 2018
- Early Registration Deadline: 16 February 2018
- Final Registration Deadline: 18 May 2018
See What's included...
On this accelerated CRISC course, you'll get official ISACA Student Kits which include:
- Certification Review Manual
- A 12 month subscription to Exam Review Questions, Answers and Explanations
- Sample Practice Questions
- Copy of Course Materials
You'll also access additional, exclusive CRISC curriculum built by Firebrand.
Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.
Our Certification Programs includes
- Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
- Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
- Fully instructor-led program with 24 hour lab access
- Examination vouchers **
- Near site testing, Transportation to/from Testing Center are provided ***
- Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
- Examination Passing Policy
- * Not on all courses
- ** Examination vouchers are not included for the following courses: PMP, CAPM and CISSP CBK Review
- *** Not included in our PMP, CAPM, CISA, CISM, CGEIT, CRISC, (ISC)2 or ITIL Managers and Revision Certifications
- **** Accommodation not included on the CISSP CBK Review Seminar
Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.
Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.
Examination Passing Policy
Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year. Students will only be responsible for accommodations and vendor exam fees.
This CRISC training course is designed for IT and business professionals who are engaged at an operational or management level to mitigate risk. It is therefore an advantage to have knowledge of business and technology risk management, and the implementation of information systems controls. You should also be familiar with general IT and business terminology.
In order to get your CRISC certification, you must:
- pass the CRISC exam
- adhere to the Code of Professional Ethics
- adhere to the Continuing Professional Education (CPE) Policy
- have at least three years of cumulative work experience performing the tasks of a CRISC professional across at least two of the four CRISC domains - of these two required domains, one must be in either Domain 1 or 2.
There are no experience waivers or substitutions allowed.
You may take the exam prior to meeting the requirements, but your CRISC designation is only awarded, when all requirements are met. Experience must have been gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the examination.
Retaking and passing the examination will be required if the application for certification is not submitted within five years from the passing date of the examination. All experience must be verified independently with employers.
Once a CRISC candidate has passed the CRISC certification exam and has met the work experience requirements, the final step is to complete and submit the CRISC Application for Certification.
Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.
ISACA CRISC Course Dates
ISACA - CRISC Certification (Certified in Risk and Information Systems Control)
Here's the Firebrand Training review section. Since 2001 we've trained exactly 74,961 students and asked them all to review our Accelerated Learning. Currently, 96.78% have said Firebrand exceeded their expectations.
Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.
"I feel confident after the Firebrand training in all areas of knowledge competency needed to attempt the CRISC exam. Thank you."
Masarrat Shaikh, Dubai Electricity and Water Authority. (25/7/2017 to 27/7/2017)
"Firebrand takes care of my training needs end to end, including logistics, counselling and even invoicing support. The trainings I attended were always delivered by experienced people that know what they are talking about. Thumbs up!"
Rafael R. M.. (25/7/2017 to 27/7/2017)
"Firebrand works on their commitments and take due care for participants.
They provide original material and competent instructors."
M.B.. (25/7/2017 to 27/7/2017)
"A fast way to gain knowledge and get certified."
Anonymous (3/2/2020 to 5/2/2020)
"Interesting and enjoyable course. The training location supports the accelerated learning model."
R.M., Firebrand Training. (14/11/2019 to 16/11/2019)
Latest Reviews from our students