Skip to content

We would like to inform you that both our Computer Pride Nairobi and Mombasa offices will be closed completely from Wednesday, 19th July 2023 to Thursday, 27th July 2023. We will resume our regular operations on Friday, 28th July 2023.

This closure is in observance of the special Ashara Mubaraka prayers. In case of any urgent inquiries or assistance, please feel free to contact us at info@computer-pride.co.ke.

Search...

The Certified in Risk and Information Systems Control

Courses Overview

CRISC

It’s a certification offered by ISACA (Information Systems Audit and Control Association) that validates an IT professional’s ability to manage enterprise IT risk

The Certified in Risk and Information Systems Control (CRISC) It is a highly valued certification in the IT security field , the training course provides participants with an in-depth awareness of diverse business risks, as well as the practical knowledge and skills necessary to implement effective IS controls within a company.

Learners gain expertise in the governance and application of risk management strategies to enhance the value of their organization’s IT and business systems.

Domain 1: focuses on Governance, covering strategic alignment and understanding the complex interplay between business goals and IT risk.

Domain 2: dives into IT Risk Assessment, teaching learners to identify and evaluate risk to provide effective mitigation strategies.

Domain 3: outlines Risk Response and Reporting, where students learn to respond and communicate risk.

Domain 4: emphasizes Information Technology and Security, ensuring learners are well-versed in essential tech and security principles.

By mastering these domains, participants enhance their strategic acumen, risk assessment proficiencies, response planning, and reporting abilities, making them valuable assets in an organization’s effort to manage IT risk effectively. This course is essential for professionals seeking to bolster their credentials and organizations aiming to ensure robust risk management practices