وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CRISC -Certified in Risk and Information Systems Control ’23

سرفصل های دوره

The Complete ISACA CRISC Training - 2023 Latest as per review manual 7th edition


1 - GOVERNANCE 26
  • 1 - The Security Objective and CIA Triad
  • 2 - What is the Security Program
  • 3 - Security vs Privacy and Essential Security Terms
  • 4 - What is Risk Management
  • 5 - Information Security and GRC
  • 6 - What is Governance
  • 7 - Information Security Governane
  • 8 - Organizational Structure
  • 9 - Governance Roles and Responsibilities
  • 10 - RACI Matrix
  • 11 - Policies
  • 12 - Standards
  • 13 - Procedures and Guidelines
  • 14 - Types of Risk Resdiual and Inherent Risk
  • 15 - Risk Management Frameworks
  • 16 - Legal and Regulatory Requirements
  • 17 - Security Frameworks and Standards
  • 18 - Data Lifecycle
  • 19 - Data Classification Level
  • 20 - Intellectual Property

  • 2 - IT RISK ASSESSMENT 20
  • 21 - The Complete Risk Management Process
  • 22 - Risk Identification
  • 23 - Data Privacy Requirements
  • 24 - Privacy Regulations Roles
  • 25 - Security Vulnerabilities Overview
  • 26 - Security Threats
  • 27 - Security Attacks 1
  • 28 - Security Attacks 2
  • 29 - Web Application Attacks
  • 30 - Cyber Kill Chain
  • 31 - Threat Model Overview
  • 32 - STRIDE and DREAD Threat Model
  • 33 - PASTA Threat Model
  • 34 - Use Case and Abuse Case
  • 35 - Risk Analysis and Evaluation
  • 36 - Specialised Techniques in Risk Evaluation and Identification
  • 37 - Vulnerability Assessment and Risk Identification
  • 38 - Security Testing and Penetration testing techniques
  • 39 - Business Impact Assessment

  • 3 - RISK RESPONSE AND REPORTING 32
  • 40 - Risk Response
  • 41 - Security Controls Overview
  • 42 - The Organisational Security Architecture
  • 43 - Types of Security Controls
  • 44 - Control Objective and Control Testing
  • 45 - Defens in Depth or layered defenses
  • 46 - Owner and Custodian
  • 47 - Risk Reporting and Monitoring
  • 48 - Key Performance Indicators
  • 49 - Key Risk Indicator
  • 50 - Incident Response Overview
  • 51 - Security Operation Center
  • 52 - SIEM Solution Overview
  • 53 - Endpoint Detection and Response and Network detection and response
  • 54 - SOAR and XDR
  • 55 - Vulnerability Assessment tools
  • 56 - Endpoint Protection Practices
  • 57 - Network Security Devices
  • 58 - VPN Wireless IoT Security
  • 59 - Disaster Recovery Plan
  • 60 - Business Continuity Plan
  • 61 - Data Backup
  • 62 - Data Backup Types
  • 63 - Change Management Process
  • 64 - Types of Change requests
  • 65 - Social Engineering Attacks
  • 66 - Security Awareness Program as a Control

  • 4 - INFORMATION TECHNOLOGY AND SECURITY 22
  • 67 - Application architecture and Network architecture
  • 68 - Enterprise Architecture
  • 69 - Computing Device Components
  • 70 - Computing device forms and types of OS and Platforms
  • 71 - Network Foundations
  • 72 - Network Topologies
  • 73 - Domain Name System
  • 74 - OSI Model and TCPIP Model
  • 75 - OSI Model Overview
  • 76 - Network Security Controls
  • 77 - Network Security Review
  • 78 - Virtualization
  • 79 - Software Defined Networks
  • 80 - Containers and Functions
  • 81 - Cloud Computing
  • 82 - Software Development Overview
  • 83 - Software Development Methodologies
  • 84 - Software types and license types
  • 85 - Intellectual Property
  • 86 - Secure Coding
  • 87 - AAA Concept
  • 88 - Access Control and Authorization
  • 89 - What is Physical Security
  • 90 - Physical Security Controls 1
  • 91 - Physical Security Controls 2
  • 92 - Cryptography Overview
  • 93 - Symmetric Encryption
  • 94 - Asymmetric Encryption
  • 95 - Digital Signature
  • 96 - Hashing
  • 97 - Cryptography Applications
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 21702
    حجم: 6087 مگابایت
    مدت زمان: 944 دقیقه
    تاریخ انتشار: 7 آبان 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید