Companies Home Search Profile

Third Party Risk Management (TPRM) Complete Course

Focused View

Alexander Shafe

3:23:31

0 View
  • 1 - Introduction.mp4
    01:39
  • 2 - TPRM-Fundamentals.pdf
  • 2 - Understanding Third Party Risk Management TPRM.mp4
    03:02
  • 3 - Types of Third Party Relationships.mp4
    02:24
  • 4 - Benefits of Third Party Relationships.mp4
    02:47
  • 5 - Challenges With Managing Third Party Relationships.mp4
    04:39
  • 6 - Third Party Risks.mp4
    01:27
  • 7 - Inherent Risks.mp4
    02:05
  • 8 - Residual Risks.mp4
    01:31
  • 9 - Udemy Review System.mp4
    01:25
  • 10 - Resources and Recommendations.mp4
    01:57
  • 10 - coupons.docx
  • 11 - Types of Third Party Risks.mp4
    05:17
  • 12 - TPRM Program.mp4
    01:07
  • 13 - Governance Third Party Risk Management.mp4
    02:04
  • 14 - TPRM Risk Management Framework RMF.mp4
    02:17
  • 15 - NIST Cybersecurity Framework CSF 20.mp4
    02:46
  • 16 - NIST Special Publication 80053.mp4
    01:47
  • 17 - ISO27001 Framework.mp4
    03:08
  • 18 - COSO Framework.mp4
    02:41
  • 19 - SIG Questionnaire.mp4
    02:56
  • 20 - Risk Appetite.mp4
    04:55
  • 21 - TPRM Teams Roles Responsibilities I.mp4
    06:41
  • 22 - TPRM Teams Roles Reponsibilities II.mp4
    07:44
  • 23 - Regulatory Compliance.mp4
    02:24
  • 24 - Third Party Risk Management Lifecycle.mp4
    01:08
  • 25 - Planning Scoping.mp4
    03:36
  • 26 - Identifying Potential Vendors.mp4
    02:00
  • 27 - Request for Proposal RFP.mp4
    01:53
  • 28 - Request for Information RFI.mp4
    01:02
  • 29 - Selection Due Diligence.mp4
    00:41
  • 30 - Criticality Inherent Risk.mp4
    01:50
  • 31 - Due Diligence Activities.mp4
    00:44
  • 32 - Third Party Profile.mp4
    04:17
  • 33 - Inherent Risk Questionnaire.mp4
    04:32
  • 34 - Risk Assessment Due Diligence.mp4
    04:08
  • 35 - Risk Assessment.mp4
    01:25
  • 36 - Information Security Risk Assessment.mp4
    03:52
  • 37 - Operational Risk Assessment.mp4
    02:39
  • 38 - Human Resources Risk Assessment.mp4
    03:04
  • 39 - Privacy Data Protection Risk Assessment.mp4
    03:12
  • 40 - Compliance Risk Assessment.mp4
    03:16
  • 41 - Financial Risk Assessment.mp4
    02:40
  • 42 - Vendor Risk Management Framework.mp4
    01:26
  • 43 - Fourth Party Assessment.mp4
    03:19
  • 44 - Risk Identification.mp4
    03:22
  • 45 - Risk Treatment Response.mp4
    07:13
  • 46 - Risk Assessment Report.mp4
    07:15
  • 47 - Service Organization Controls SOC.mp4
    01:31
  • 48 - SOC Categories and Types.mp4
    03:32
  • 49 - Understanding SOC Reports.mp4
    04:06
  • 50 - Reviewing SOC Reports.mp4
    04:44
  • 51 - Contract Management.mp4
    02:19
  • 52 - Key Stakeholders in Contract Management.mp4
    02:56
  • 53 - Negotiating Contract Terms.mp4
    02:46
  • 54 - Contract Review and Approvals.mp4
    01:25
  • 55 - Ongoing Contract Management.mp4
    02:00
  • 56 - Key Components of Service Level Agreements SLAs.mp4
    02:57
  • 57 - Key Steps When an SLA is Breach.mp4
    02:42
  • 58 - Monitoring and Performance Tracking 1.mp4
    05:30
  • 59 - Monitoring and Performance Tracking 2.mp4
    03:51
  • 60 - Incidence Response Management 1.mp4
    04:24
  • 61 - Incidence Response Management 2.mp4
    03:59
  • 62 - Types of Contract Termination.mp4
    04:16
  • 63 - Termination and Offboarding Process Part 1.mp4
    03:47
  • 64 - Termination and Offboarding Process Part 2.mp4
    03:49
  • 65 - Best Practices for Effective Termination and Offboarding.mp4
    01:20
  • 66 - Continuous Improvement Activities.mp4
    03:43
  • 67 - Congratulations.mp4
    00:37
  • Description


    Vendor Risk Management | TPRM Lifecycle | GRC | IT Audit

    What You'll Learn?


    • Third Party Risk Management
    • Third Party Risk Management Lifecycle
    • Planning and preparation
    • Selection and Due Diligence
    • Contract Negotiation and Onboarding
    • Incident Management and Response
    • Termination and Offboarding
    • Continuous Monitoring

    Who is this for?


  • Students, Professionals, Starting or Changing career into IT
  • Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT Auditor, IT professionals
  • What You Need to Know?


  • Laptop, Desktop required to view and participate in lessons
  • Enthusiastic about learning about learning how to perform a Risk Assessment
  • More details


    Description

    In today's interconnected world, third-party relationships are essential for business success. However, these relationships can also expose organizations to significant risks—cyber threats, data breaches, regulatory non-compliance, financial loss, operational disruptions and reputational damage.

    Introducing the comprehensive "Third Party Risk Management" course!
    Gain the expertise needed to effectively manage and mitigate the risks associated with third-party vendors and partners.


    What Will You Learn?

    • Understanding Third Party Risk: Define and assess the different types of third-party risks, from financial to cybersecurity.

    • The TPRM Lifecycle: Learn about the complete lifecycle of third-party risk management, including due diligence, contracting, performance tracking, risk monitoring, and offboarding.

    • Vendor Due Diligence: Understand how to effectively perform due diligence when onboarding new third-party vendors.

    • Incident Management & Response: Gain skills in developing incident response plans for third-party breaches and understand how to recover quickly.

    • Regulatory Compliance: Master the key regulatory requirements related to third-party risks, including GDPR, CCPA, SOC 2, PCI DSS, and Sarbanes Oxley (SOX).

    • TPRM Governance: Understand governance frameworks that align with the organization’s risk appetite and tolerance.

    • Risk Assessment Techniques: Learn how to evaluate third-party risks using industry-leading frameworks like NIST, ISO 27001, COSO ERM, and Shared Assessments SIG.


    Who Should Enroll:

    • Students, IT Professionals, Starting or Changing career into IT

    • Anyone interested in pursuing a career in Third Party Risk Management

    • IT professionals

    • Risk Analyst

    • IT Security Analyst

    • IT Compliance Analyst

    • Cyber Security Professionals

    • IT Auditors

    • IT Control Testers

    • Information Security Professionals


    Don't Miss Out - Enroll Today! Invest in your future and take your career to new heights with the Third-Party Risk Management Complete Course. Join thousands of satisfied students who have transformed their careers with our industry-leading training.

    Who this course is for:

    • Students, Professionals, Starting or Changing career into IT
    • Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT Auditor, IT professionals

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Alexander Shafe
    Alexander Shafe
    Instructor's Courses
    Hello there,My name is Alex and I'm glad to be here with you. I have experience as an IT Security Consultant, Data Consultant, Data Analyst and Database Administrator.My goal is to make your learning efficient, smooth and equip you with the skillset you need to start or transition into any data related field.My courses are hands-on and thoughtfully designed to cut through the chase; teaching you what you need to know from beginner to advanced level. I am confident that by the end of the course you will feel confident in your skillset and ready to explore the many possibilities out there. Happy learning.Alex
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 67
    • duration 3:23:31
    • Release Date 2025/02/25

    Courses related to Risk Management