مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CRISC Arabic Training | دورة أدارة مخاطر نظم المعلومات
مقدمة التدريب
CRISC Course Introduction & Success Roadmap (12:38)
📌 القسم الأول
Governance, Strategy, Structure, and Culture (17:31)
Policies, Standards, and Business Processes (16:52)
ERM, RMF, and the Three Lines Model (18:45)
Risk Appetite, Tolerance, and Risk Profile (19:23)
Stakeholder Engagement and Governance Reporting (19:18)
Regulated and Critical Infrastructure Contexts (18:19)
Operating Model, RACI, and Evidence Readiness (14:20)
Governance Metrics and KRIs at the Top (18:16)
CRISC Domain 1 Recap & Rapid Review (15:12)
📌 القسم الثاني
Threat Modeling: STRIDE, ATT&CK, and Attack Paths (17:54)
Scoping Scenarios from Threat Intelligence (19:31)
Vulnerabilities vs. Control Deficiencies (RCA) (18:35)
Data Collection, Elicitation, and SME Calibration (16:50)
Business Impact Analysis (BIA) Quick Method (18:40)
Risk Analysis Methods: Qualitative & Semi-Quantitative (15:39)
FAIR-Style Reasoning for CRISC (14:08)
Risk Register: Fields, Taxonomy, and Prioritization (20:36)
Validation and Peer Review of Assessments (15:22)
CRISC Domain 2 Recap & Rapid Review (22:51)
📌 القسم الثالث
Response Options and Treatment Planning (13:54)
Control Types and Selection (20:17)
Cross-Framework Mapping (ISO, NIST, COBIT) (15:34)
Control Design and Implementation (15:34)
KCIs and Assurance of Effectiveness (Periodic Testing) (15:11)
Third-Party Risk: Tiering, Contracts, and Monitoring (17:49)
Issue, Finding, and Exception Management (16:55)
Metrics that Matter: KPIs, KRIs, KCIs (18:33)
Continuous Monitoring and Reporting Cadence (16:36)
Executive Dashboards and Board Communications (17:36)
CRISC Domain 3 Recap & Rapid Review (23:00)
📌 القسم الرابع
Enterprise Architecture and Secure SDLC (16:47)
Requirements, Threat Modeling, and Design Reviews (18:17)
Project/Program Risk in Delivery Portfolios (18:52)
IT Operations: Change, Incident, and Problem Management (18:51)
Resilience, Disaster Recovery, and Cyber Resilience (18:22)
Data Lifecycle, Privacy, and Protection (16:30)
Security Awareness and Risk Culture (17:54)
Identity, Access, and Zero Trust from a Risk Lens (19:39)
Cloud Shared Responsibility (IaaS, PaaS, SaaS) (17:50)
Emerging Technologies, AI, and Risk Governance (17:16)
Evidence Logs as Assurance Artifacts (19:04)
CRISC Domain 4 Recap & Rapid Review (23:12)
📌 القسم الخامس (تطبيقات ودراسات حالة)
ISACA Exams: Learning Secrets (18:06)
Case Study: Healthcare Ransomware (17:12)
Case Study: SaaS Misconfiguration & Data Exposure (17:14)
Case Study: Third-Party Breach in Finance (16:31)
Case Study: Cloud Migration (Lift-and-Shift vs Refactor) (18:16)
Capstone: End-to-End Risk Scenario & Board Report (17:24)
Requirements, Threat Modeling, and Design Reviews
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock