Companies Home Search Profile

CGRC -Certified in Governance Risk and Compliance - NIST RMF

Focused View

7:45:07

0 View
  • 1. Overview of ISC2 and CGRC Certification.mp4
    03:53
  • 2. Introduction to Governance.mp4
    07:13
  • 3. Legal and Regulatory Requirements and its impact.mp4
    04:00
  • 4. Business Strategy and Plans and Goals.mp4
    05:24
  • 5. Security Program.mp4
    13:49
  • 6. Business Case and Feasibility Analysis.mp4
    04:44
  • 7. Management Buy In.mp4
    04:46
  • 8. Policies.mp4
    04:46
  • 9. Policy development Best Practices.mp4
    06:47
  • 10. Standards.mp4
    04:18
  • 11. Procedures & Guidelines.mp4
    04:24
  • 12. Global Regulatory Landscape.mp4
    12:11
  • 13. Gap Analysis Process.mp4
    07:27
  • 1. Establishing an Information Security Risk Management Program.mp4
    10:12
  • 2. Risk Profile.mp4
    05:36
  • 3. Risk Terminologies.mp4
    06:50
  • 4. Risk Identification.mp4
    06:48
  • 5. Risk Analysis.mp4
    08:52
  • 6. Risk Evaluation and Treatement.mp4
    12:43
  • 7. Risk Reporting, Communication & Monitoring.mp4
    09:23
  • 8.1 NIST SP 800-37r2 - Direct Link.html
  • 8. Understanding the NIST Risk Management Framework (RMF) - SP 800-37.mp4
    05:58
  • 9.1 COSO ERM Guidance Useful Resources.html
  • 9. Understanding COSO ERM.mp4
    07:39
  • 10. Understanding ISO 27001 & 31000 in ERM.mp4
    06:36
  • 1. The CIA Concept and DAD, Understand the Security Aspects.mp4
    07:15
  • 2. Categorizing Information Systems.mp4
    05:58
  • 3.1 FIPS 199 Standard for Reference.html
  • 3. Applying FIPS 199 Standards.mp4
    05:43
  • 4. What is the Enterprise Architecture - EA.mp4
    06:14
  • 5. Common EA and Governance Frameworks.mp4
    11:22
  • 6. IT Asset Management.mp4
    09:48
  • 7. Shadow IT Risks.mp4
    05:22
  • 8. Acceptable Use Policy, Physical Security Policy.mp4
    07:21
  • 9. Data & Assets Lifecycle.mp4
    09:32
  • 10. Data Classification Levels.mp4
    12:40
  • 11. Data Protection Policies.mp4
    08:19
  • 12. Data Protection and Privacy.mp4
    11:01
  • 13. Privacy Policy.mp4
    04:58
  • 1. Security Vulnerabilities.mp4
    05:15
  • 2. Threat Modeling.mp4
    16:45
  • 3. NIST SP 800-30.html
  • 4. Selecting Appropriate Security Controls.mp4
    11:26
  • 5. Control examples.mp4
    06:50
  • 6. Control Concepts - Control Objective.mp4
    07:22
  • 7. Layered Defenses.mp4
    08:10
  • 8. Implementing NIST SP 800-53.html
  • 9. System Security Plans.html
  • 10. Implementing Selected Security Controls.html
  • 11. Documenting Security Control Implementation.html
  • 12. Assessing Security Control Effectiveness.html
  • 13. Metrics and KPIs.mp4
    16:06
  • 14. Utilizing NIST SP 800-53A.html
  • 15. Evaluation of Controls.mp4
    05:42
  • 1. Why Authorization is Crucial.html
  • 2. Preparing for Information System Authorization.html
  • 3. System Authorization Roles.html
  • 4. Understand Roles and Responsibilities - RACI Chart.mp4
    04:48
  • 5. Creating Authorization Packages.html
  • 6. Outsourcing and Contractors.mp4
    20:53
  • 7. Supply Chain Risk Management.mp4
    06:35
  • 8. The System Authorization Life Cycle.html
  • 9. Why System Authorization Programs Failure Reasons.html
  • 10. System Authorization Documentation.html
  • 11. Change Management.mp4
    13:44
  • 12. Configuration Management.mp4
    07:34
  • 13. Release Management.mp4
    10:07
  • 14. Software Testing and Accreditation and Certification.mp4
    11:15
  • 15. Application Testing Tools.mp4
    08:48
  • 1. Auditing and Assurance.mp4
    05:29
  • 2. Plan for Improvement - Maturity Models.mp4
    06:28
  • 3. Security Assessment.mp4
    10:12
  • 4. Implementing Continuous Monitoring Programs.html
  • 5. Utilizing NIST SP 800-137.html
  • 6. Conducting Key Updates for the Systems.html
  • 7. Post-Release Activities.html
  • 8. Patch Management.mp4
    04:54
  • 9. System Hardening, Security and Backup Policies.mp4
    06:52
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 57
    • duration 7:45:07
    • English subtitles has
    • Release Date 2024/11/03