وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
4

CRISC -Certified in Risk and Information Systems Control ’23

سرفصل های دوره

The Complete ISACA CRISC Training - 2023 Latest as per review manual 7th edition


1 - GOVERNANCE 26
  • 1 - The Security Objective and CIA Triad
  • 2 - What is the Security Program
  • 3 - Security vs Privacy and Essential Security Terms
  • 4 - What is Risk Management
  • 5 - Information Security and GRC
  • 6 - What is Governance
  • 7 - Information Security Governane
  • 8 - Organizational Structure
  • 9 - Governance Roles and Responsibilities
  • 10 - RACI Matrix
  • 11 - Policies
  • 12 - Standards
  • 13 - Procedures and Guidelines
  • 14 - Types of Risk Resdiual and Inherent Risk
  • 15 - Risk Management Frameworks
  • 16 - Legal and Regulatory Requirements
  • 17 - Security Frameworks and Standards
  • 18 - Data Lifecycle
  • 19 - Data Classification Level
  • 20 - Intellectual Property

  • 2 - IT RISK ASSESSMENT 20
  • 21 - The Complete Risk Management Process
  • 22 - Risk Identification
  • 23 - Data Privacy Requirements
  • 24 - Privacy Regulations Roles
  • 25 - Security Vulnerabilities Overview
  • 26 - Security Threats
  • 27 - Security Attacks 1
  • 28 - Security Attacks 2
  • 29 - Web Application Attacks
  • 30 - Cyber Kill Chain
  • 31 - Threat Model Overview
  • 32 - STRIDE and DREAD Threat Model
  • 33 - PASTA Threat Model
  • 34 - Use Case and Abuse Case
  • 35 - Risk Analysis and Evaluation
  • 36 - Specialised Techniques in Risk Evaluation and Identification
  • 37 - Vulnerability Assessment and Risk Identification
  • 38 - Security Testing and Penetration testing techniques
  • 39 - Business Impact Assessment

  • 3 - RISK RESPONSE AND REPORTING 32
  • 40 - Risk Response
  • 41 - Security Controls Overview
  • 42 - The Organisational Security Architecture
  • 43 - Types of Security Controls
  • 44 - Control Objective and Control Testing
  • 45 - Defens in Depth or layered defenses
  • 46 - Owner and Custodian
  • 47 - Risk Reporting and Monitoring
  • 48 - Key Performance Indicators
  • 49 - Key Risk Indicator
  • 50 - Incident Response Overview
  • 51 - Security Operation Center
  • 52 - SIEM Solution Overview
  • 53 - Endpoint Detection and Response and Network detection and response
  • 54 - SOAR and XDR
  • 55 - Vulnerability Assessment tools
  • 56 - Endpoint Protection Practices
  • 57 - Network Security Devices
  • 58 - VPN Wireless IoT Security
  • 59 - Disaster Recovery Plan
  • 60 - Business Continuity Plan
  • 61 - Data Backup
  • 62 - Data Backup Types
  • 63 - Change Management Process
  • 64 - Types of Change requests
  • 65 - Social Engineering Attacks
  • 66 - Security Awareness Program as a Control

  • 4 - INFORMATION TECHNOLOGY AND SECURITY 22
  • 67 - Application architecture and Network architecture
  • 68 - Enterprise Architecture
  • 69 - Computing Device Components
  • 70 - Computing device forms and types of OS and Platforms
  • 71 - Network Foundations
  • 72 - Network Topologies
  • 73 - Domain Name System
  • 74 - OSI Model and TCPIP Model
  • 75 - OSI Model Overview
  • 76 - Network Security Controls
  • 77 - Network Security Review
  • 78 - Virtualization
  • 79 - Software Defined Networks
  • 80 - Containers and Functions
  • 81 - Cloud Computing
  • 82 - Software Development Overview
  • 83 - Software Development Methodologies
  • 84 - Software types and license types
  • 85 - Intellectual Property
  • 86 - Secure Coding
  • 87 - AAA Concept
  • 88 - Access Control and Authorization
  • 89 - What is Physical Security
  • 90 - Physical Security Controls 1
  • 91 - Physical Security Controls 2
  • 92 - Cryptography Overview
  • 93 - Symmetric Encryption
  • 94 - Asymmetric Encryption
  • 95 - Digital Signature
  • 96 - Hashing
  • 97 - Cryptography Applications
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 21702
    حجم: 6087 مگابایت
    مدت زمان: 944 دقیقه
    تاریخ انتشار: ۷ آبان ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید