CISRM - Certified Information Systems Risk Manager Certification Course
8/3/2020 - 8/5/2020COURSE LENGTH:
9:00am - 4:30pm
This three-day course vendor neutral Certified Information Systems Risk Managercertificationis designed for IT and IS professionals who are involved with risk identification, assessment& evaluation, risk response, risk monitoring, IS control design & implementation as well as IS control monitoring & maintenance.
AUDIENCE AND PREREQUISITES
The Certified Information Systems Risk Manager training will enable professionals toelevate their understanding in identifying and evaluating entity-specific risk but also aid them in assessing risks associated to enterprise business objectives by equipping the practitioner to design, implement, monitor and maintain risk-based, efficient and effective IS controls.
Who Should Attend?
Information System Security Officers
Information Systems Owners
Info Security Control Assessors
State & Local Government Risk Managers
Context knowledge of data analysis and business intelligence scenarios. For example, an understanding of a work-related business intelligence project or need.
Basic knowledge of the Windows operating system and its core functionality, including file system navigation.
Basic understanding of the purpose of relational database management systems such as SQL Server.
*Course Cost listed does not include the cost of courseware or Exam cost. If you have any questions, please contact us at email@example.com or 207-775-0244. Course is subject to a minimum enrollment ro run. If minimum is not met this class may run as a Virtual Instructor led class or live online. Certification Exam: Mile2 C)ISRM, Covers ISACA CRISC®CPEs: 24.
The Certified Information Systems Risk Managerexam is taken online Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD a
At Course Completion: Certified Information Systems Risk Managerstudents will be preparedto pass the CISRM exam. Candidate will be competent to implement risk management best practices and Federal standards. Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever-changing security and risk environment. C)ISRM Part 1: The Big PictureC)ISRM Part II -Domain 1 Risk Identification Assessment and EvaluationC)ISRM Part II Domain 2 -Risk ResponseC)ISRM Part II -Domain 3 -Risk MonitoringC)ISRM Part II Domain 4 -IS Control Design and ImplementationModule 6: Encapsulating Data Retrieval Logic Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Lab 1: Encapsulating Data Retrieval Logic Create a SQL login Create a database user and assign required permissions Create a database schema for views, functions, and stored procs Create a view, Create a table-values function Create a stored procedure Allow a user with read-only access to use views, table-valued functions, and store proceduresModule 7: Getting Your Dataset to the Client Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel, PowerBI, RStudio Exporting datasets to files using, Results pane from SSMS The bcp utility, The Import/Export Wizard Lab 1: Getting Your Dataset to the Client Retrieving the results of a view in Excel Running an ad-hoc SELECT query from Excel Running an ad-hoc query from PowerBI Running an ad-hoc query from RStudio Using the Import/Export wizard to write the results of a query to a text file