Submit
Ask
Create Account
Log In
Submit
Create Account
Log In
Ask
Create Account
Featured
Programming
DevOps
Virtualization
Databases
Security
OS
Microsoft
Networking
Web Dev
Cloud
Mobile
Multimedia
Productivity
...
We help IT Professionals succeed at work.
CREATE ACCOUNT
SEE HOW IT WORKS
Experts Exchange
>
Videos
> Certified in Risk and Information System Control - Domain 3 Risk Response and Mitigation.
Facebook
Twitter
LinkedIn
Link
URL copied to clipboard
<
Certified in Risk and Information System Control - Domain 3 Risk Response and Mitigation.
Posted on
2021-01-25
Security
information security
riskmanagement
CRISC
3,034 Points
0 Comments
34 Views
Last Modified:
2021-01-26
Published
Experience Level: Advanced
Your browser does not support the video element.
54:44
Muneeb Imran Shaikh
Strategy, Governance & Risk Consultant | Cyber Threat Intelligence Specialist | Privacy ISO27701 LI |ISO 27001 LI | COBIT 2019
Follow
This is one of my sessions that I conducted in 2019 to support in preparation of CRISC Exam.
0
Author:
Muneeb Imran Shaikh
0 Comments
Suggested Videos
Title
Views
Activity
Using a PowerShell Script to get a reverse shell in Windows Server 2022 [Part 1]
19
2025-11-19
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and the Registry [Part 2]
27
10h
Getting a reverse shell in Windows Server 2022 and adding it to another CVE [CVE-2023-23397 -Part 4]
21
2025-11-04
Getting a reverse shell in Windows Server 2022 and adding it to another CVE [CVE-2024-21413 -Part 5]
20
2025-11-04
Best Practices for Cloud Threat Modeling
Article by:
madunix
Cloud Threat Modeling aids organizations in initiating or advancing security discussions, evaluating security controls, identifying gaps and making system design and mitigation decisions in today’s cloud-dominant businesses and industries.
Security
CSPM vs CNAPP: What’s the Difference in Azure
Article by:
Arnav
Cloud security isn’t a “set and forget” game. As your Azure environment scales, so does your risk.
Cloud Computing
Azure
Security
Other videos by this author
CRISC Domain 3 | Risk Response and Mitigation Preparation | Muneeb Imran Shaikh
(54:44)
Cyber Threat Intelligence - A Partner in Risk Management | Muneeb Imran Shaikh
(24:37)
Challenges Impairing Cyber Security Operations in Threat Hunting | Muneeb Imran Shaikh
(38:22)
Suggested Courses
How to Prepare for and Navigate a Ransomware Attack
Open Shortest Path First (OSPF) Routing
Certified Penetration Testing Engineer (CPTE) Training
Next Video:
Using a PowerShell Script to get a reverse shell in Windows Server 2022 and NC64 [Bypass Windows Defender]
Keep in touch with Experts Exchange
Tech news and trends delivered to your inbox every month