Certified in Governance, Risk and Compliance (CGRC)

The Certified in Governance, Risk, and Compliance Training Course is a thorough curriculum designed to demonstrate an individual’s proficiency in incorporating governance, risk management, performance management, and regulatory compliance into the operations of the company. By thoroughly covering seven key areas, this course starts the process of creating a strong program for managing information security risks.

This product is currently out of stock and unavailable.

Overview

A thorough training program called the Certified in Governance, Risk, and Compliance (CGRC) course is intended to give students the know-how and abilities they need to manage governance, risk, and compliance in a company. The development and upkeep of a strong risk management program are covered, along with other crucial information security and privacy topics. The course teaches participants how to choose and approve security and privacy controls, how to evaluate and audit these controls, and how to comprehend and apply regulatory and legal requirements.

What you will Learn in this Certified in Governance, Risk and Compliance (CGRC) Course?

  • Understand the foundational elements of an effective Information security risk management program, including its processes and relevant regulatory and legal requirements.
  • Define and categorize information systems to align with organizational risk management strategies.
  • Identify, document, and tailor security and privacy controls, and develop a strategy for continuous monitoring and effectiveness evaluation.
  • Implement and document the deployment of selected security and privacy controls within the information system.
  • Prepare for, conduct, and report on the assessment or audit of security and privacy controls, and develop a comprehensive remediation plan.
  • Compile necessary documentation for the authorization or approval process of information systems and assess the associated risks.
  • Authorize or approve information systems based on documented risk assessments and management strategies.
  • Analyze the impact of environmental changes on information systems and adjust monitoring strategies accordingly.
  • Engage in response planning and communication for cyber events, ensuring officials are informed of the organization’s risk posture.
  • Decommission information systems when necessary, following proper procedures and updates to risk management documentation.

Who should take up this Certified in Governance, Risk and Compliance (CGRC) Course?

  • Chief Information Security Officers (CISOs)
  • Risk Management Professionals
  • Compliance Officers
  • IT Auditors
  • Information Security Analysts
  • Governance and Compliance Consultants
  • Data Privacy Managers
  • IT Managers/Directors
  • Security Operations Managers
  • Cybersecurity Advisors
  • Network Security Engineers

Our Package

Domain 1: Information Security Risk Management Program

1.1 Understand the foundation of an organization information security risk management program
» Principles of information security
» Risk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organization for Standardization (ISO) 27001, International Organization for Standardization (ISO) 31000)
» System Development Life Cycle (SDLC)
» Information system boundary requirements
» Security controls and practices
» Roles and responsibilities in the authorization/approval process
1.2 Understand risk management program processes
» Select program management controls
» Privacy requirements
» Determine third-party hosted information systems
1.3 Understand regulatory and legal requirements
» Familiarize with governmental, organizational and international regulatory security and privacy requirements
(e.g., International Organization for Standardization (ISO) 27001, Federal Information Security Modernization Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
» Familiarize with other applicable security-related mandates

Domain 2: Scope of the Information System

2.1 Define the information system
» Determine the scope of the information system
» Describe the architecture (e.g., data flow, internal and external interconnections)
» Describe information system purpose and functionality
2.2 Determine categorization of the information system
» Identify the information types processed, stored or transmitted by the information system
» Determine the impact level on confidentiality, integrity, and availability for each information type
(e.g., Federal Information Processing Standards (FIPS) 199, International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
» Determine information system categorization and document results

Domain 3: Selection and Approval of Security and Privacy Controls

3.1 Identify and document baseline and inherited controls
3.2 Select and tailor controls to the system
» Determine applicability of recommended baseline and inherited controls
» Determine appropriate use of control enhancements (e.g., security practices, overlays, countermeasures)
» Document control applicability
3.3 Develop continuous control monitoring strategy
(e.g., implementation, timeline, effectiveness)
3.4 Review and approve security plan/Information Security Management System (ISMS)

Domain 4: Implementation of Security and Privacy Controls

4.1 Implement selected controls
» Determine mandatory configuration settings and verify implementation in accordance with current industry
standards (e.g., Information Technology Security Guidance ITSG-33 – Annex 3A, Technical Guideline for
Minimum Security Measures, United States Government Configuration Baseline (USGCB), National Institute
of Standards and Technology (NIST) checklists, Security Technical Implementation Guides (STIGs), Center for
Internet Security (CIS) benchmarks, General Data Protection Regulation (GDPR))
» Ensure that implementation of controls is consistent with the organizational architecture and associated
security and privacy architecture
» Coordinate implementation of inherited controls with control providers
» Determine and implement compensating/alternate security controls
4.2 Document control implementation
» Document inputs to the planned controls, their expected behavior, and expected outputs or deviations
» Verify the documented details of the controls meet the purpose, scope and risk profile of the information
system
» Obtain and document implementation details from appropriate organization entities
(e.g., physical security, personnel security, privacy)

Domain 5: Assessment/Audit of Security and Privacy Controls

5.1 Prepare for assessment/audit
» Determine assessor/auditor requirements
» Establish objectives and scope
» Determine methods and level of effort
» Determine necessary resources and logistics
» Collect and review artifacts (e.g., previous assessments/audits, system documentation, policies)
» Finalize the assessment/audit plan
5.2 Conduct assessment/audit
» Collect and document assessment/audit evidence
» Assess/audit implementation and validate compliance using approved assessment methods
(e.g., interview, test and examine)
5.3 Prepare the initial assessment/audit report
» Analyze assessment/audit results and identify vulnerabilities
» Propose remediation actions
5.4 Review initial assessment/audit report and perform remediation actions
» Determine risk responses
» Apply remediations
» Reassess and validate the remediated controls
5.5 Develop final assessment/audit report
5.6 Develop remediation plan
» Analyze identified residual vulnerabilities or deficiencies
» Prioritize responses based on risk level
» Identify resources (e.g. financial, personnel, and technical) and determine the appropriate timeframe/
schedule required to remediate deficiencies

Domain 6: Authorization/Approval of Information System

6.1 Compile security and privacy authorization/approval documents
» Compile required security and privacy documentation to support authorization/approval decision by the
designated official
6.2 Determine information system risk
» Evaluate information system risk
» Determine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)
» Determine residual risk
6.3 Authorize/approve information system
» Determine terms of authorization/approval

Domain 7: Continuous Monitoring

7.1 Determine impact of changes to information system and environment
» Identify potential threat and impact to operation of information system and environment
» Analyze risk due to proposed changes accounting for organizational risk tolerance
» Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
» Implement proposed changes
» Validate changes have been correctly implemented
» Ensure change management tasks are performed
7.2 Perform ongoing assessments/audits based on organizational requirements
» Monitor network, physical and personnel activities (e.g., unauthorized assets, personnel and related activities)
» Ensure vulnerability scanning activities are performed
» Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)
7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency
reports, news reports)
7.4 Actively participate in response planning and communication of a cyber event
» Ensure response activities are coordinated with internal and external stakeholders
» Update documentation, strategies and tactics incorporating lessons learned
7.5 Revise monitoring strategies based on changes to industry developments introduced through
legal, regulatory, supplier, security and privacy updates
7.6 Keep designated officials updated about the risk posture for continuous authorization/approval
» Determine ongoing information system risk
» Update risk register, risk treatment and remediation plan
7.7 Decommission information system
» Determine information system decommissioning requirements
» Communicate decommissioning of information system
» Remove information system from operations

Upcoming Batch

April 20th (Weekends)

FRI & SAT (4 Weeks)

08:30 PM to 01:00 AM (CDT)

April 18th (Weekdays)

MON – FRI (18 Days)

10:00 AM to 12:00 PM (CDT)

Certified in Governance, Risk and Compliance (CGRC) FAQs

Q. What will I learn in the Certified in Governance, Risk and Compliance (CGRC) training?
Ans.

The CGRC course covers governance frameworks, risk management processes, compliance regulations, and ethical principles. It teaches practical skills in overseeing risk, ensuring compliance, and fostering corporate integrity, benefiting learners with holistic GRC expertise.

Q. What are the career prospects after completing the Certified in Governance, Risk and Compliance (CGRC) training?
Ans.

After CGRC training, individuals can pursue roles like Compliance Officer, Risk Manager, and Governance Analyst in finance, healthcare, or government sectors with potential for leadership positions, enhancing career growth.

Q. What are the prerequisites for enrolling in the Certified in Governance, Risk and Compliance (CGRC) course?
Ans.
  • A basic understanding of Information security concepts and terminology.
  • Familiarity with IT infrastructure and the role of information systems within an organization.
  • Knowledge of fundamental risk management principles and practices.
  • Awareness of common legal and regulatory requirements affecting Information security.
  • Ability to comprehend and apply security and privacy controls to various scenarios.
  • Basic project management skills to understand the implementation and monitoring of security measures.
  • Analytical skills to assess and interpret the impact of changes to information systems.
  • Prior exposure to or experience with IT governance is helpful but not mandatory.
Q. Which certification exam is linked with the Certified in Governance, Risk and Compliance (CGRC) course?
Ans.

The course Certified in Governance, Risk and Compliance (CGRC) is linked to CGRC.

Q. What is the duration of the Certified in Governance, Risk and Compliance (CGRC) course?
Ans.

The duration of the course 40 hours.

Q. What is required for online training?
Ans.

A laptop, decent internet speed, a Headset with microphone is required.

Reviews

There are no reviews yet.

Be the first to review “Certified in Governance, Risk and Compliance (CGRC)”

Your email address will not be published. Required fields are marked *