CISRM - Certified Information Systems Risk Manager Certification Course
Request a Class



COURSE TIMES: 9:00am - 4:30pm

Printable version of this course


This three-day course vendor neutral Certified Information Systems Risk Managercertificationis designed for IT and IS professionals who are involved with risk identification, assessment& evaluation, risk response, risk monitoring, IS control design & implementation as well as IS control monitoring & maintenance.
The Certified Information Systems Risk Manager training will enable professionals toelevate their understanding in identifying and evaluating entity-specific risk but also aid them in assessing risks associated to enterprise business objectives by equipping the practitioner to design, implement, monitor and maintain risk-based, efficient and effective IS controls.


Who Should Attend?
Information System Security Officers
Risk Managers
Information Systems Owners
Info Security Control Assessors
System Managers
State & Local Government Risk Managers
Context knowledge of data analysis and business intelligence scenarios. For example, an understanding of a work-related business intelligence project or need.
Basic knowledge of the Windows operating system and its core functionality, including file system navigation.
Basic understanding of the purpose of relational database management systems such as SQL Server.


*Course Cost listed does not include the cost of courseware or Exam cost. If you have any questions, please contact us at or 207-775-0244. Course is subject to a minimum enrollment ro run. If minimum is not met this class may run as a Virtual Instructor led class or live online. Certification Exam: Mile2 C)ISRM, Covers ISACA CRISC®CPEs: 24. The Certified Information Systems Risk Managerexam is taken online Assessment and Certification System (“MACS”), which is accessible on your account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD a


At Course Completion:
Certified Information Systems Risk Managerstudents will be preparedto pass the CISRM exam.
Candidate will be competent to implement risk management best practices and Federal standards.
Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever-changing security and risk environment.

C)ISRM Part 1: The Big Picture

C)ISRM Part II -Domain 1 Risk Identification Assessment and Evaluation

C)ISRM Part II Domain 2 -Risk Response

C)ISRM Part II -Domain 3 -Risk Monitoring

C)ISRM Part II Domain 4 -IS Control Design and Implementation

Module 6: Encapsulating Data Retrieval Logic
Table-valued functions
Stored procedures
Creating objects for read-access users
Creating database accounts for analytical client tools
Lab 1: Encapsulating Data Retrieval Logic
Create a SQL login
Create a database user and assign required permissions
Create a database schema for views, functions, and stored procs
Create a view, Create a table-values function
Create a stored procedure
Allow a user with read-only access to use views, table-valued functions, and store procedures

Module 7: Getting Your Dataset to the Client
Connecting to SQL Server and Submitting Queries from Client Tools
Connecting and running SELECT queries from:
Excel, PowerBI, RStudio
Exporting datasets to files using, Results pane from SSMS
The bcp utility, The Import/Export Wizard
Lab 1: Getting Your Dataset to the Client
Retrieving the results of a view in Excel
Running an ad-hoc SELECT query from Excel
Running an ad-hoc query from PowerBI
Running an ad-hoc query from RStudio
Using the Import/Export wizard to write the results of a query to a text file