CGRC -Certified in Governance Risk and Compliance - NIST RMF
Focused View
7:45:07
0 View
1. Overview of ISC2 and CGRC Certification.mp4
03:53
2. Introduction to Governance.mp4
07:13
3. Legal and Regulatory Requirements and its impact.mp4
04:00
4. Business Strategy and Plans and Goals.mp4
05:24
5. Security Program.mp4
13:49
6. Business Case and Feasibility Analysis.mp4
04:44
7. Management Buy In.mp4
04:46
8. Policies.mp4
04:46
9. Policy development Best Practices.mp4
06:47
10. Standards.mp4
04:18
11. Procedures & Guidelines.mp4
04:24
12. Global Regulatory Landscape.mp4
12:11
13. Gap Analysis Process.mp4
07:27
1. Establishing an Information Security Risk Management Program.mp4
10:12
2. Risk Profile.mp4
05:36
3. Risk Terminologies.mp4
06:50
4. Risk Identification.mp4
06:48
5. Risk Analysis.mp4
08:52
6. Risk Evaluation and Treatement.mp4
12:43
7. Risk Reporting, Communication & Monitoring.mp4
09:23
8.1 NIST SP 800-37r2 - Direct Link.html
8. Understanding the NIST Risk Management Framework (RMF) - SP 800-37.mp4
05:58
9.1 COSO ERM Guidance Useful Resources.html
9. Understanding COSO ERM.mp4
07:39
10. Understanding ISO 27001 & 31000 in ERM.mp4
06:36
1. The CIA Concept and DAD, Understand the Security Aspects.mp4
07:15
2. Categorizing Information Systems.mp4
05:58
3.1 FIPS 199 Standard for Reference.html
3. Applying FIPS 199 Standards.mp4
05:43
4. What is the Enterprise Architecture - EA.mp4
06:14
5. Common EA and Governance Frameworks.mp4
11:22
6. IT Asset Management.mp4
09:48
7. Shadow IT Risks.mp4
05:22
8. Acceptable Use Policy, Physical Security Policy.mp4
07:21
9. Data & Assets Lifecycle.mp4
09:32
10. Data Classification Levels.mp4
12:40
11. Data Protection Policies.mp4
08:19
12. Data Protection and Privacy.mp4
11:01
13. Privacy Policy.mp4
04:58
1. Security Vulnerabilities.mp4
05:15
2. Threat Modeling.mp4
16:45
3. NIST SP 800-30.html
4. Selecting Appropriate Security Controls.mp4
11:26
5. Control examples.mp4
06:50
6. Control Concepts - Control Objective.mp4
07:22
7. Layered Defenses.mp4
08:10
8. Implementing NIST SP 800-53.html
9. System Security Plans.html
10. Implementing Selected Security Controls.html
11. Documenting Security Control Implementation.html
12. Assessing Security Control Effectiveness.html
13. Metrics and KPIs.mp4
16:06
14. Utilizing NIST SP 800-53A.html
15. Evaluation of Controls.mp4
05:42
1. Why Authorization is Crucial.html
2. Preparing for Information System Authorization.html
3. System Authorization Roles.html
4. Understand Roles and Responsibilities - RACI Chart.mp4
04:48
5. Creating Authorization Packages.html
6. Outsourcing and Contractors.mp4
20:53
7. Supply Chain Risk Management.mp4
06:35
8. The System Authorization Life Cycle.html
9. Why System Authorization Programs Failure Reasons.html
10. System Authorization Documentation.html
11. Change Management.mp4
13:44
12. Configuration Management.mp4
07:34
13. Release Management.mp4
10:07
14. Software Testing and Accreditation and Certification.mp4
11:15
15. Application Testing Tools.mp4
08:48
1. Auditing and Assurance.mp4
05:29
2. Plan for Improvement - Maturity Models.mp4
06:28
3. Security Assessment.mp4
10:12
4. Implementing Continuous Monitoring Programs.html
5. Utilizing NIST SP 800-137.html
6. Conducting Key Updates for the Systems.html
7. Post-Release Activities.html
8. Patch Management.mp4
04:54
9. System Hardening, Security and Backup Policies.mp4
06:52
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 57
- duration 7:45:07
- English subtitles has
- Release Date 2024/11/03