Certified in Governance, Risk and Compliance (CGRC)

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The Certified in Governance, Risk, and Compliance (CGRC) course is a comprehensive training program designed to equip learners with expert knowledge and skills in managing governance, risk, and compliance within an organization. It covers essential aspects of information security and privacy, addressing the creation and maintenance of a robust risk management program. Through the course, participants learn to understand and implement regulatory and legal requirements, develop strategies for selecting and approving security and privacy controls, and effectively assess and audit these controls.Information security risk management is at the heart of Module 1, providing a foundation for the entire course. The course progresses through practical lessons on defining and categorizing information systems (Module 2), selecting appropriate security measures (Module 3), and implementing these measures (Module 4). Participants also gain proficiency in preparing and conducting assessments and audits (Module 5), authorizing information systems (Module 6), and engaging in continuous monitoring (Module 7) to ensure ongoing compliance and risk mitigation.By the end of the CGRC course, learners will have a thorough understanding of governancerisk management, and compliance practices, equipping them with the competencies needed to safeguard their organizations against evolving threats and to ensure adherence to relevant standards and regulations.

Show More

What Will You Learn?

  • Understand the foundational elements of an effective information security risk management program, including its processes and relevant regulatory and legal requirements.
  • Define and categorize information systems to align with organizational risk management strategies.
  • Identify, document, and tailor security and privacy controls, and develop a strategy for continuous monitoring and effectiveness evaluation.
  • Implement and document the deployment of selected security and privacy controls within the information system.
  • Prepare for, conduct, and report on the assessment or audit of security and privacy controls, and develop a comprehensive remediation plan.
  • Compile necessary documentation for the authorization or approval process of information systems and assess the associated risks.
  • Authorize or approve information systems based on documented risk assessments and management strategies.
  • Analyze the impact of environmental changes on information systems and adjust monitoring strategies accordingly.
  • Engage in response planning and communication for cyber events, ensuring officials are informed of the organization's risk posture.
  • Decommission information systems when necessary, following proper procedures and updates to risk management documentation.