Agenda
- About the C)ISRM Exam
- Exam Relevance
- C)ISRM Review Course
- Section Overview
- Part 1 Learning Objectives
- Risk Management
- Section Topics
- Overview of Risk Management
- Risk
- Risk and Opportunity Management
- Responsibility vs. Accountability
- Risk Management Roles and Responsibilities
- Risk Management Frameworks, Standards and Practices
- Relevance of Risk Management Frameworks, Standards and Practices
- Frameworks
- Standards
- Practices
- Essentials of Risk Governance
- Relevance of Risk Governance
- Overview of Risk Governance
- Objectives of Risk Governance
- Foundation of Risk Governance
- Risk Appetite and Tolerance
- Risk Appetite and Risk Tolerance
- Risk Awareness and Communication
- Key Concepts of Risk Governance
- Risk Culture
- Case Study & Practice Questions
- Case Study
- Practice Question 1
- Practice Question 2
- Practice Question 3
- Practice Question 4
- Practice Question 5
- Definitions and Acronyms
- Acronym Review
- Definition Review
- Supplemental Exercises
- Big Picture Exercises
- Suggested Resources for Further Study
- End of C)ISRM Part I – The Big Picture
- Risk Identification, Assessment and Evaluation
- Section Overview
- Exam Relevance
- Domain 1 Learning Objectives
- Tasks and Knowledge Statements
- Task Statements
- Knowledge Statements
- Risk Identification, Assessment and Evaluation
- The Process
- Describing the Business Impact of IT Risk
- IT Risk in the Risk Hierarchy
- IT Risk Categories
- High Level Process Phases
- Generic Risk Scenarios
- Risk Scenarios
- Definition of Risk Scenario
- Event Types
- Purpose of Risk Scenarios
- Risk Scenario Development
- Risk Register
- Risk Profile
- Risk Scenario Development
- Risk Scenario Components
- Risk Scenario Development Enablers
- Systemic, Contagious or Obscure Risk
- Generic IT Risk Scenarios
- Risk Factors
- Definition of Risk Factor
- Examples of Risk Factors
- Risk Factors— External Environment
- Risk Factors— Risk Management Capability
- Risk Factors— IT Capability
- Risk Factors— IT Related Business Capabilities
- Risk Assessment Methods
- Methods for Analyzing IT Risk
- Likelihood and Impact
- Risk Analysis Output
- Risk Analysis Methods
- Risk Analysis Methods— Quantitative
- Risk Analysis Methods— Qualitative
- Risk Analysis Methods— for HIGH impact risk types
- Risk Analysis Methods
- Risk Analysis Methods— Business Impact Analysis (BIA)
- Methods for Assessing IT Risk
- IT Risk Identification and Assessment
- Identifying and Assessing IT Risk
- Definitions
- Adverse Impact of Risk Event
- Business Impacts From IT Risk
- Business Related IT Risk Types
- IT Project-Related Risk
- Risk Components— Inherent Risk
- Risk Components— Residual Risk
- Risk Components— Control Risk
- Risk Components— Detection Risk
- Business Risk and Threats Addressed By IT Resources
- Identifying and Assessing IT Risk
- Methods For Describing IT Risk In Business Term
- s
- Methods For Describing IT Risk In Business Terms
- Case Study & Practice Questions
- Case Study or Exercise
- Practice Question 1
- Practice Question 2
- Practice Question 3
- Practice Question 4
- Practice Question 5
- Definitions and Acronyms
- Acronym Review
- Definition Review
- Supplemental Exercises
- Domain 1
- – Exercises
- Suggested Resources for Further Study
- End of C)ISRM Part II
- – Domain 1
- Section Overview
- Exam Relevance
- Domain 2 Learning Objectives
- Tasks and Knowledge Statements
- Task Statements
- Knowledge Statements
- Risk Response Process
- Risk Response Objectives
- The Risk Response Process
- Risk Response Options
- Risk Response Parameters
- Risk Tolerance and Risk Response Options
- Risk Response Prioritization Options
- Risk Mitigation Control Types
- Risk Response Prioritization Factors
- Risk Response Tracking, Integration and Implementation
- Risk Response Process Details
- Process Phases
- Phase 1
- – Articulate Risk
- Phase 2
- – Manage Risk
- Phase 3
- – React To Risk Events
- Risk Response and Risk Management Frameworks
- Risk Management Frameworks
- Case Study and Practice Questions
- Sample Case Study or Exercise
- Practice Question 1
- Practice Question 2
- Practice Question 3
- Practice Question 4
- Practice Question 5
- Definitions and Acronyms
- Acronym Review
- Definition Review
- Supplemental Exercises
- Domain 2
- – Exercises
- Suggested Resources for Further Study
- End of C)ISRM Part II
- Risk Monitoring
- Course Agenda
- Exam Relevance
- Learning Objectives
- Tasks and Knowledge Statements
- Task Statements
- Knowledge Statements
- Essentials of Risk Monitoring
- Essentials
- Key Risk Indicators
- Risk Indicators
- Risk Indicator Selection Criteria
- Risk Indicator Types and Parameters
- Risk Indicator Considerations
- Criteria for KRI Selection
- Benefits of Selecting Right KRIs
- Disadvantages of Wrong KRIs
- Changing KRIs
- KPIs
- Data Extraction, Aggregation, & Analysis
- Gathering KRI Data
- Steps to Data Gathering
- Gathering Requirements
- Data Access
- Data Preparation
- Data Validating Considerations
- Data Analysis
- Reporting and Corrective Actions
- Optimizing KRIs
- Capability Maturity Models
- Use of Maturity Level Assessment
- Assessing Risk Maturity Levels
- Risk Management Capability Maturity Levels
- Changes to Threats, Vulnerabilities and Assets
- Changing Threat Levels
- Monitoring Changes in Threat Levels
- Measuring Changes in Threat Levels
- Responding to Changes in Threat Levels
- Threat Level Review
- Changes in Asset Value
- Maintain Asset Inventory
- Risk Reporting
- Reporting Content
- Effective Reports
- Report Recommendations
- Possible Risk Report Recipients
- Periodic Reporting
- Reporting Topics
- Risk Reporting Techniques
- Case Study & Practice Questions
- Sample Case Study or Exercise
- Practice Question 1
- Practice Question 2
- Practice Question 3
- Practice Question 4
- Definitions and Acronyms
- Acronym Review
- Definition Review
- Domain 3 – Exercises
- Suggested Resources for Further Study
- End of C)ISRM Part II – Domain 3
- Information Systems Control Design and Implementation
- Section Overview
- Exam Relevance
- Domain 4 Learning Objectives
- Tasks and Knowledge Statements
- Task Statements
- Knowledge Statements
- Control Design Considerations
- C)ISRM Involvement
- Control Definition
- Control Categories
- Control Types and Effects
- Control Methods
- Control Design Considerations
- Control Strength
- Control Costs and Benefits
- Potential Loss Measures
- Total Cost of Ownership For Controls
- System Development Life Cycle (SDLC)
- Role of the C)ISRM in SDLC
- The SDLC Process
- The Systems Development Life Cycle (SDLC)
- ‘Meets and Continues to Meet’
- SDLC
- SDLC Phases
- Addressing Risk Within the SDLC
- Business Risk versus Project Risk
- Understanding Project Risk
- Addressing Business Risk
- Understanding Business and Risk Requirements
- Understand Business Risk
- System Development Life Cycle (SDLC) Phases
- High Level SDLC Phases
- 1. Project Initiation (and Requirements Definition)
- Project Initiation
- Phase 1 – Project Initiation
- Phase 1 Tasks
- Task 1—Feasibility Study
- Feasibility Study Components
- Determining Feasibility
- Outcomes of the Feasibility Study
- Task 2—Define Requirement
- Requirement Progression
- Business Information Requirements (COBIT)
- Requirements Success Factors
- Task 3—Acquire Software “Options”
- Software Selection Criteria
- Software Acquisition
- Software Acquisition Process
- 2. Project Design and Development
- Leading Principles for Design and Implementation
- C)ISRM Responsibilities
- Key System Design Activities:
- Steps to Perform Phase 2
- Phase 2 – Project Design and Development
- 3. Project Testing
- System Testing
- Test Plans
- Project Testing
- Types of Tests
- UAT Requirements
- Certification and Accreditation
- Project Status Reports
- Phase 3 – Project Testing
- Testing Techniques
- Alpha Testing
- Beta Testing
- Function Validation
- Parallel Testing
- Pilot Testing
- Regression Testing
- Sociability Testing
- White Box Testing
- Verification and Validation
- 4. Project Implementation
- Phase 4
- – Project Implementation
- Project Implementation
- Implementation Phases
- End User Training Plans & Techniques
- Training Strategy
- Data Migration/Conversion Considerations
- Risks During Data Migration
- Data Conversion Steps
- Implementation Rollback
- Data Conversion Project Key Considerations
- Changeover Techniques
- Post-Implementation Review
- Performing Post-Implementation Review
- Measurements of Critical Success Factors
- Closing a Project
- Project Management and Controlling
- Project Management Practices
- Project Management Tools and Techniques
- Project Management Elements
- Project Management Practices
- PERT chart and critical path
- PERT Attribute
- Case Study & Practice Questions
- Sample Case Study or Exercise
- Practice Question 1
- Practice Question 2
- Practice Question 3
- Practice Question 4
- Practice Question 5
- Definitions and Acronyms
- Acronym Review
- Definition Review
- Domain 4
- – Exercises
- Suggested Resources for Further Study
- End of C)ISRM Part II
FREE
Interested in course?
Course Type: Self Paced