Instructor

CGRC Certification Training – Master Governance, Risk & Compliance

Curriculum

Earn your CGRC certification with comprehensive Governance, Risk, and Compliance training. Gain expertise in risk management and compliance strategies for career growth.

Ratings

( 4.5 Ratings )

Live Online Classes starting on 01 January, 1970

CGRC – Governance, Risk and Compliance Certification

The CGRC course provides comprehensive training in managing governance, risk, and compliance within an organization. Key areas include:

  • Information Security Risk Management (Module 1): Fundamentals of risk management.

  • Defining and Categorizing Information Systems (Module 2): Establishing and classifying systems.

  • Selecting Security Measures (Module 3): Choosing appropriate controls.

  • Implementing Security Measures (Module 4): Deployment of controls.

  • Assessment and Audit (Module 5): Conducting and preparing assessments and audits.

  • Authorizing Information Systems (Module 6): Approval processes and risk assessment.

  • Continuous Monitoring (Module 7): Ongoing compliance and risk mitigation.

By the end of the course, learners will be equipped with the skills to manage governance, risk, and compliance practices, ensuring organizational security and adherence to standards.

 

Course Prerequisites

To effectively participate in the CGRC course, students should:

  • Have a basic understanding of information security concepts.

  • Be familiar with IT infrastructure and the role of information systems.

  • Know fundamental risk management principles.

  • Be aware of legal and regulatory requirements affecting information security.

  • Comprehend and apply security and privacy controls.

  • Possess basic project management skills for security measure implementation and monitoring.

  • Have analytical skills to assess impacts on information systems.

Prior experience with IT governance is helpful but not mandatory. A general background in IT or related fields will facilitate learning.

 

Target Audience

The course is aimed at professionals involved in managing IT risks and compliance, including:

  • Chief Information Security Officers (CISOs)

  • Risk Management Professionals

  • Compliance Officers

  • IT Auditors

  • Information Security Analysts

  • Governance and Compliance Consultants

  • Data Privacy Managers

  • IT Managers/Directors

  • Security Operations Managers

  • Cybersecurity Advisors

  • Network Security Engineers

  • Systems Administrators focusing on security

  • Legal professionals specializing in cyber law and IT compliance

  • Chief Technology Officers (CTOs)

  • Project Managers for IT security projects

  • Security Architects

  • Corporate Security Officers

  • Incident Response Team members

  • Business Continuity and Disaster Recovery Specialists

 

Learning Objectives

Participants will:

  • Understand the components of an effective information security risk management program.

  • Define and categorize information systems to support risk management.

  • Identify, document, and implement security and privacy controls, and develop continuous monitoring strategies.

  • Conduct and report on assessments and audits of security controls, creating remediation plans as needed.

  • Prepare and document authorization processes for information systems.

  • Analyze the impact of changes to information systems and adjust monitoring strategies.

  • Plan and communicate responses to cyber events and update risk management documentation as needed.

  • Follow proper procedures for decommissioning information systems and updating risk management records.

 

Course Outline

1) Prepare

  • Explain the purpose and value of preparation

  • Identify references associated with the Prepare step

  • Identify other risk management frameworks and their relationship to RMF tasks

  • Identify relevant security and privacy regulations

  • List the references, processes and outcomes that define:

  • Complete selected Prepare Tasks for the example system

2) Categorize

  • Explain the purpose and value of categorization

  • Identify references associated with the Categorize step

  • List the references, processes, and outcomes that define Risk Management Framework (RMF) Task C-1: System Description

  • Describe a system’s architecture

  • Describe an information system’s purpose and functionality

  • Describe and document a system’s characteristics

  • List the references, processes and outcomes that define RMF Task C-2: Security Categorization

  • Categorize an information system

  • List the references, processes and outcomes that define RMF Task C-3: Security Categorization Review and Approval

  • Describe the review and approval process for security categorization

  • Categorize the example systems

3) Select

  • Explain the purpose and value of control selection and allocation

  • Identify references associated with the Select step

  • Relate the ISO 27001 Statement of Applicability to the NIST RMF

  • List the references, processes and outcomes that define RMF Task S-1: Control Selection

  • List the references, processes and outcomes that define RMF Task S-2: Control Tailoring

  • Select appropriate security control baselines based on organizational guidance

  • Tailor controls for a system within a specified operational environment

  • List the references, processes and outcomes that define RMF Task S-3: Control Allocation

  • List the references, processes and outcomes that define RMF Task S-4: Documentation of Planned Control Implementations

  • Allocate security and privacy controls to the system and to the environment of operation

  • Document the controls for the system and environment of operation in security and privacy plans

  • List the references, processes and outcomes that define RMF Task S-5: Continuous Monitoring Strategy - System

  • Develop and implement a system-level strategy for monitoring control effectiveness that is consistent with and supplements the organizational continuous monitoring strategy

  • List the references, processes and outcomes that define RMF Task S-6: Plan Review and Approval

  • Review and approve the security and privacy plans for the system and the environment of operation

  • Allocate security controls for the example system

  • Tailor security controls for the example system

  • Draft a continuous monitoring plan for the example system

4) Implement

  • Explain the purpose and value of implementation

  • Identify references associated with the Implement step

  • List the references, processes and outcomes that define RMF Task I-1: Control Implementation

  • Identify appropriate implementation guidance for control frameworks

  • Integrate privacy requirements with system implementation

  • List the references, processes and outcomes that define RMF Task I-2: Update Control Implementation Information

  • Update a continuous monitoring strategy

  • Update a control implementation plan

5) Assess

  • Explain the purpose and value of assessment

  • Identify references associated with the Assess step

  • Understand and identify common elements of the NIST process that are included in other frameworks and processes

  • List the references, processes and outcomes that define RMF Task A-1: Assessor Selection

  • List the references, processes and outcomes that define RMF Task A-2: Assessment Plan

  • List the references, processes and outcomes that define RMF Task A-3: Control Assessment

  • List the references, processes and outcomes that define RMF Task A-4: Assessment Reports

  • List the references, processes and outcomes that define RMF Task A-5: Remediation Actions

  • List the references, processes and outcomes that define RMF Task A-6: Plan of Action and Milestones

  • Develop an assessment plan for identified controls in the example system

  • Develop a remediation plan for unsatisfied controls in the example system

6) Authorize

  • Explain the purpose and value of authorization

  • Identify references associated with the Authorize step

  • Relate system approvals under organizational processes to the concepts applied in the NIST RMF

  • List the references, processes and outcomes that define RMF Task R-1: Authorization Package

  • List the references, processes and outcomes that define RMF Task R-2: Risk Analysis and Determination

  • List the references, processes and outcomes that define RMF Task R-3: Risk Response

  • List the references, processes and outcomes that define RMF Task R-4: Authorization Decision

  • List the references, processes and outcomes that define RMF Task R-5: Authorization Reporting

  • Develop a risk determination for the example system on the system risk level

  • Authorize the system for operation

  • Determine appropriate elements for the Authorization decision document for the example system

7) Monitor

  • Explain the purpose and value of monitoring

  • Identify references associated with the Monitor step

  • List the references, processes and outcomes that define RMF Task M-1: System and Environment Changes

  • (Coordinate) Integrate cybersecurity risk management with organizational change management

  • List the references, processes and outcomes that define RMF Task M-2: Ongoing Assessments

  • Monitor risks associated with supply chain

  • List the references, processes and outcomes that define RMF Task M-3: Ongoing Risk Response

  • Understand elements for communication surrounding a cyber event

  • List the references, processes and outcomes that define RMF Task M-4: Authorization Package Updates

  • List the references, processes and outcomes that define RMF Task M-5: Security and Privacy Reporting

  • List the references, processes and outcomes that define RMF Task M-6: Ongoing Authorization

  • List the references, processes and outcomes that define RMF Task M-7: System Disposal

  • Discuss Monitor step activities in the example system

8) CAP Certification Information

(4.5 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications