Deloitte Courses
$607.50
A course will be available for 365 days upon enrollment
Uncategorized

Deloitte Courses

There is no description for this curriculum

Curriculum content

  • Course Overview: The MetricStream’s IT-Risk (ITR) Management app helps to  assess, measures, and monitors IT operational and security risks in relation to strategic goals and objectives of the organization. The app also helps quantify the risk in terms of its monetary value which helps organizations adopt a suitable risk mitigation method.   Level Advanced (Euphrates 1) Content 5 Hours Practice 5 Hours Q&A with MSU 2 Hours Pre-Requisites Familiarity with IT & Cyber Risk Concepts Certification Awarded* MetricStream Certified IT Risk Management Product Implementation Associate Learning Objectives:  The training is focused on making trainees understand the features, process, workflows, and functionalities of the IT Risk Management Product. At the end of the training, practice and certification, trainees will have knowledge on how to implement and perform basic configurations on the ITR product which includes knowledge on:     ·              Product Functionality & Use Case - Workflow Usage o     Understand how to navigate the IT and Cyber Risk Management app o     Create IT Risk Management content  o     Create, approve and manage Risk Assessment plans o     Execute IT- Risk assessments  o     Create, approve and manage threats, threat actors and alerts o     Create, approve and manage Vulnerabilities o     Log, approve, manage, monitor and close issues ·              Product Configuration o     Configuration Workbooks o     Updating IT-Risk LOVs o     Updating IT-Risk Data Tables o    IT-Risk Configuration Parameters ·                 Product/Use Case Setup, User Management & Basic Administration o     Upload IT Risk Management content  o     Subscribe to external alerts & channels o     Setup remediation rules & templates o     Setup Quantitative & Qualitative assessment factors o     Configure connectors o     Provision/Deactivate Users o     IT-Risk Role Activities & Objects o     Map Users to IT-Risk Org-Role Pairs    Practice & Facetime with Instructor: Once you start the course, please reach out to MSU at [email protected] to get a practice instance allocated.   Upon completion of course content and sufficient practice, reach out to your MSU instructor for your 2 hr Q&A session to clarify and address any open questions.   Certification (Optional): To be certified, you need to score a minimum of 75% on both the objective and practical assessment. You are allowed a maximum of 2 attempts to pass the certification tests. Please reach out to the instructor once you are ready for assessment. The maximum duration allowed for appearing for assessment is 2 weeks from the course assignment date.
    • Lesson Overview & Navigation

      IT and Cyber Risk Management product provides a systematic approach for identifying, assessing, and treating information security risks on business-critical processes, information technology assets and applications.
    • Lesson GRC Libraries

      GRC Foundation is a comprehensive set of interlinked libraries that form the underlying GRC framework for all GRC-related activities across the enterprise. It is an add-on component to the base MetricStream Integrated Risk Platform and is always installed for all products.
    • Lesson Qualitative Assessments

      Qualitative Assessments module helps you to to schedule risk assessments, assess risks and controls, log findings and issues, and reassess risks.
    • Lesson Threats

      The Threats module is used to gain insight into the list of threats. You can capture ad hoc threat, alert details, the details of different threats, and threat actors to identify the strength of the threat and possibility of the threat being carried out.
    • Lesson Vulnerabilities

      The Vulnerabilities module helps you to gain insight into the list of vulnerabilities. You can capture vulnerability details to identify the severity and exposure level of the vulnerability.
    • Lesson Issues

      The Issues module allows companies to establish and follow consistent procedures for issue reporting, task management, and status reporting. It supports the identification and evaluation of issues as well as case investigation and tracking leading to an elaborate remediation or corrective action process.
    • Lesson IT-Risk - Product Setup

      MetricStream components can be tailored to specific requirements of an organization in different ways. This unit covers the most common requirements and functions performed by an 'Apps Administrator. '
    • Lesson IT-Risk Product Configuration

      This unit covers configuration topics enabling you to populate configuration workbooks, updating LOVs and Data Table on forms and defining workflow parameters. 
    • Lesson IT-Risk Product Administration

      This unit will enable you to provision, deactivate and map users to various roles in the IT-Risk app.
    • Lesson IT & Cyber Risk Training Collaterals

      IT & Cyber Risk Training Collaterals
    • Lesson IT and Cyber Risk Management App Practice (4 Hours)

      Please reach out to your trainer for credentials to the practice instance before starting this unit.
    • Lesson Assessment & Certification

      Thank you for completing this IT Compliance Course. Kindly reach out to your instructor at [email protected] for access to the following certification assessments:
  • Course Overview:  The MetricStream Platform provides a complete GRC Solution.   Level Basic Content 1 Hour Pre-Requisites Familiarity with platform basics   Learning Objectives:  This eLearning course provides an overview on the key features and architectural improvements in M7 and discusses some of the new features and capabilities.
  • IT Risk Analyst is responsible for defining and planning the IT-Risk Management Program (define IT-Risks/Controls, define Assets/Asset Classes in scope, setup Factors/Perspectives/Scoring, setup IT-Risk Assessment Plans, first-level reviews, review and track to closure IT-Risk Assessment Findings/Observations. Level – Advanced Course Duration – 100 Minutes of Training Content  Course Completion Requirement –  2 weeks from date of assignment Pre-requisites: Familiarity with policy management concepts Course Objectives At the end of this course, you will: Create and Approve Libraries Create, Approve and Perform Risk Assessments Setup Threats and Vulnerabilities Log Issues