CGRC – Governance, Risk and Compliance Certification
The Certified in Governance, Risk, and Compliance (CGRC) course equips learners with expertise in managing governance, risk, and compliance within organizations. It covers critical areas such as risk management, security controls, and regulatory requirements. Participants learn to implement and assess controls, conduct audits, and ensure continuous monitoring, preparing them to safeguard their organizations against evolving threats and maintain regulatory adherence.
Instructor
CGRC Certification Training – Master Governance, Risk & Compliance
Curriculum
Earn your CGRC certification with comprehensive Governance, Risk, and Compliance training. Gain expertise in risk management and compliance strategies for career growth.
Implementing Security Measures (Module 4): Deployment of controls.
Assessment and Audit (Module 5): Conducting and preparing assessments and audits.
Authorizing Information Systems (Module 6): Approval processes and risk assessment.
Continuous Monitoring (Module 7): Ongoing compliance and risk mitigation.
By the end of the course, learners will be equipped with the skills to manage governance, risk, and compliance practices, ensuring organizational security and adherence to standards.
Course Prerequisites
To effectively participate in the CGRC course, students should:
Have a basic understanding of information security concepts.
Be familiar with IT infrastructure and the role of information systems.
Know fundamental risk management principles.
Be aware of legal and regulatory requirements affecting information security.
Comprehend and apply security and privacy controls.
Possess basic project management skills for security measure implementation and monitoring.
Have analytical skills to assess impacts on information systems.
Prior experience with IT governance is helpful but not mandatory. A general background in IT or related fields will facilitate learning.
Target Audience
The course is aimed at professionals involved in managing IT risks and compliance, including:
Chief Information Security Officers (CISOs)
Risk Management Professionals
Compliance Officers
IT Auditors
Information Security Analysts
Governance and Compliance Consultants
Data Privacy Managers
IT Managers/Directors
Security Operations Managers
Cybersecurity Advisors
Network Security Engineers
Systems Administrators focusing on security
Legal professionals specializing in cyber law and IT compliance
Chief Technology Officers (CTOs)
Project Managers for IT security projects
Security Architects
Corporate Security Officers
Incident Response Team members
Business Continuity and Disaster Recovery Specialists
Learning Objectives
Participants will:
Understand the components of an effective information security risk management program.
Define and categorize information systems to support risk management.
Identify, document, and implement security and privacy controls, and develop continuous monitoring strategies.
Conduct and report on assessments and audits of security controls, creating remediation plans as needed.
Prepare and document authorization processes for information systems.
Analyze the impact of changes to information systems and adjust monitoring strategies.
Plan and communicate responses to cyber events and update risk management documentation as needed.
Follow proper procedures for decommissioning information systems and updating risk management records.
Course Outline
1) Prepare
Explain the purpose and value of preparation
Identify references associated with the Prepare step
Identify other risk management frameworks and their relationship to RMF tasks
Identify relevant security and privacy regulations
List the references, processes and outcomes that define:
Complete selected Prepare Tasks for the example system
2) Categorize
Explain the purpose and value of categorization
Identify references associated with the Categorize step
List the references, processes, and outcomes that define Risk Management Framework (RMF) Task C-1: System Description
Describe a system’s architecture
Describe an information system’s purpose and functionality
Describe and document a system’s characteristics
List the references, processes and outcomes that define RMF Task C-2: Security Categorization
Categorize an information system
List the references, processes and outcomes that define RMF Task C-3: Security Categorization Review and Approval
Describe the review and approval process for security categorization
Categorize the example systems
3) Select
Explain the purpose and value of control selection and allocation
Identify references associated with the Select step
Relate the ISO 27001 Statement of Applicability to the NIST RMF
List the references, processes and outcomes that define RMF Task S-1: Control Selection
List the references, processes and outcomes that define RMF Task S-2: Control Tailoring
Select appropriate security control baselines based on organizational guidance
Tailor controls for a system within a specified operational environment
List the references, processes and outcomes that define RMF Task S-3: Control Allocation
List the references, processes and outcomes that define RMF Task S-4: Documentation of Planned Control Implementations
Allocate security and privacy controls to the system and to the environment of operation
Document the controls for the system and environment of operation in security and privacy plans
List the references, processes and outcomes that define RMF Task S-5: Continuous Monitoring Strategy - System
Develop and implement a system-level strategy for monitoring control effectiveness that is consistent with and supplements the organizational continuous monitoring strategy
List the references, processes and outcomes that define RMF Task S-6: Plan Review and Approval
Review and approve the security and privacy plans for the system and the environment of operation
Allocate security controls for the example system
Tailor security controls for the example system
Draft a continuous monitoring plan for the example system
4) Implement
Explain the purpose and value of implementation
Identify references associated with the Implement step
List the references, processes and outcomes that define RMF Task I-1: Control Implementation
Identify appropriate implementation guidance for control frameworks
Integrate privacy requirements with system implementation
List the references, processes and outcomes that define RMF Task I-2: Update Control Implementation Information
Update a continuous monitoring strategy
Update a control implementation plan
5) Assess
Explain the purpose and value of assessment
Identify references associated with the Assess step
Understand and identify common elements of the NIST process that are included in other frameworks and processes
List the references, processes and outcomes that define RMF Task A-1: Assessor Selection
List the references, processes and outcomes that define RMF Task A-2: Assessment Plan
List the references, processes and outcomes that define RMF Task A-3: Control Assessment
List the references, processes and outcomes that define RMF Task A-4: Assessment Reports
List the references, processes and outcomes that define RMF Task A-5: Remediation Actions
List the references, processes and outcomes that define RMF Task A-6: Plan of Action and Milestones
Develop an assessment plan for identified controls in the example system
Develop a remediation plan for unsatisfied controls in the example system
6) Authorize
Explain the purpose and value of authorization
Identify references associated with the Authorize step
Relate system approvals under organizational processes to the concepts applied in the NIST RMF
List the references, processes and outcomes that define RMF Task R-1: Authorization Package
List the references, processes and outcomes that define RMF Task R-2: Risk Analysis and Determination
List the references, processes and outcomes that define RMF Task R-3: Risk Response
List the references, processes and outcomes that define RMF Task R-4: Authorization Decision
List the references, processes and outcomes that define RMF Task R-5: Authorization Reporting
Develop a risk determination for the example system on the system risk level
Authorize the system for operation
Determine appropriate elements for the Authorization decision document for the example system
7) Monitor
Explain the purpose and value of monitoring
Identify references associated with the Monitor step
List the references, processes and outcomes that define RMF Task M-1: System and Environment Changes
(Coordinate) Integrate cybersecurity risk management with organizational change management
List the references, processes and outcomes that define RMF Task M-2: Ongoing Assessments
Monitor risks associated with supply chain
List the references, processes and outcomes that define RMF Task M-3: Ongoing Risk Response
Understand elements for communication surrounding a cyber event
List the references, processes and outcomes that define RMF Task M-4: Authorization Package Updates
List the references, processes and outcomes that define RMF Task M-5: Security and Privacy Reporting
List the references, processes and outcomes that define RMF Task M-6: Ongoing Authorization
List the references, processes and outcomes that define RMF Task M-7: System Disposal
Discuss Monitor step activities in the example system
Implementing Security Measures (Module 4): Deployment of controls.
Assessment and Audit (Module 5): Conducting and preparing assessments and audits.
Authorizing Information Systems (Module 6): Approval processes and risk assessment.
Continuous Monitoring (Module 7): Ongoing compliance and risk mitigation.
By the end of the course, learners will be equipped with the skills to manage governance, risk, and compliance practices, ensuring organizational security and adherence to standards.
Course Prerequisites
To effectively participate in the CGRC course, students should:
Have a basic understanding of information security concepts.
Be familiar with IT infrastructure and the role of information systems.
Know fundamental risk management principles.
Be aware of legal and regulatory requirements affecting information security.
Comprehend and apply security and privacy controls.
Possess basic project management skills for security measure implementation and monitoring.
Have analytical skills to assess impacts on information systems.
Prior experience with IT governance is helpful but not mandatory. A general background in IT or related fields will facilitate learning.
Target Audience
The course is aimed at professionals involved in managing IT risks and compliance, including:
Chief Information Security Officers (CISOs)
Risk Management Professionals
Compliance Officers
IT Auditors
Information Security Analysts
Governance and Compliance Consultants
Data Privacy Managers
IT Managers/Directors
Security Operations Managers
Cybersecurity Advisors
Network Security Engineers
Systems Administrators focusing on security
Legal professionals specializing in cyber law and IT compliance
Chief Technology Officers (CTOs)
Project Managers for IT security projects
Security Architects
Corporate Security Officers
Incident Response Team members
Business Continuity and Disaster Recovery Specialists
Learning Objectives
Participants will:
Understand the components of an effective information security risk management program.
Define and categorize information systems to support risk management.
Identify, document, and implement security and privacy controls, and develop continuous monitoring strategies.
Conduct and report on assessments and audits of security controls, creating remediation plans as needed.
Prepare and document authorization processes for information systems.
Analyze the impact of changes to information systems and adjust monitoring strategies.
Plan and communicate responses to cyber events and update risk management documentation as needed.
Follow proper procedures for decommissioning information systems and updating risk management records.
Course Outline
1) Prepare
Explain the purpose and value of preparation
Identify references associated with the Prepare step
Identify other risk management frameworks and their relationship to RMF tasks
Identify relevant security and privacy regulations
List the references, processes and outcomes that define:
Complete selected Prepare Tasks for the example system
2) Categorize
Explain the purpose and value of categorization
Identify references associated with the Categorize step
List the references, processes, and outcomes that define Risk Management Framework (RMF) Task C-1: System Description
Describe a system’s architecture
Describe an information system’s purpose and functionality
Describe and document a system’s characteristics
List the references, processes and outcomes that define RMF Task C-2: Security Categorization
Categorize an information system
List the references, processes and outcomes that define RMF Task C-3: Security Categorization Review and Approval
Describe the review and approval process for security categorization
Categorize the example systems
3) Select
Explain the purpose and value of control selection and allocation
Identify references associated with the Select step
Relate the ISO 27001 Statement of Applicability to the NIST RMF
List the references, processes and outcomes that define RMF Task S-1: Control Selection
List the references, processes and outcomes that define RMF Task S-2: Control Tailoring
Select appropriate security control baselines based on organizational guidance
Tailor controls for a system within a specified operational environment
List the references, processes and outcomes that define RMF Task S-3: Control Allocation
List the references, processes and outcomes that define RMF Task S-4: Documentation of Planned Control Implementations
Allocate security and privacy controls to the system and to the environment of operation
Document the controls for the system and environment of operation in security and privacy plans
List the references, processes and outcomes that define RMF Task S-5: Continuous Monitoring Strategy - System
Develop and implement a system-level strategy for monitoring control effectiveness that is consistent with and supplements the organizational continuous monitoring strategy
List the references, processes and outcomes that define RMF Task S-6: Plan Review and Approval
Review and approve the security and privacy plans for the system and the environment of operation
Allocate security controls for the example system
Tailor security controls for the example system
Draft a continuous monitoring plan for the example system
4) Implement
Explain the purpose and value of implementation
Identify references associated with the Implement step
List the references, processes and outcomes that define RMF Task I-1: Control Implementation
Identify appropriate implementation guidance for control frameworks
Integrate privacy requirements with system implementation
List the references, processes and outcomes that define RMF Task I-2: Update Control Implementation Information
Update a continuous monitoring strategy
Update a control implementation plan
5) Assess
Explain the purpose and value of assessment
Identify references associated with the Assess step
Understand and identify common elements of the NIST process that are included in other frameworks and processes
List the references, processes and outcomes that define RMF Task A-1: Assessor Selection
List the references, processes and outcomes that define RMF Task A-2: Assessment Plan
List the references, processes and outcomes that define RMF Task A-3: Control Assessment
List the references, processes and outcomes that define RMF Task A-4: Assessment Reports
List the references, processes and outcomes that define RMF Task A-5: Remediation Actions
List the references, processes and outcomes that define RMF Task A-6: Plan of Action and Milestones
Develop an assessment plan for identified controls in the example system
Develop a remediation plan for unsatisfied controls in the example system
6) Authorize
Explain the purpose and value of authorization
Identify references associated with the Authorize step
Relate system approvals under organizational processes to the concepts applied in the NIST RMF
List the references, processes and outcomes that define RMF Task R-1: Authorization Package
List the references, processes and outcomes that define RMF Task R-2: Risk Analysis and Determination
List the references, processes and outcomes that define RMF Task R-3: Risk Response
List the references, processes and outcomes that define RMF Task R-4: Authorization Decision
List the references, processes and outcomes that define RMF Task R-5: Authorization Reporting
Develop a risk determination for the example system on the system risk level
Authorize the system for operation
Determine appropriate elements for the Authorization decision document for the example system
7) Monitor
Explain the purpose and value of monitoring
Identify references associated with the Monitor step
List the references, processes and outcomes that define RMF Task M-1: System and Environment Changes
(Coordinate) Integrate cybersecurity risk management with organizational change management
List the references, processes and outcomes that define RMF Task M-2: Ongoing Assessments
Monitor risks associated with supply chain
List the references, processes and outcomes that define RMF Task M-3: Ongoing Risk Response
Understand elements for communication surrounding a cyber event
List the references, processes and outcomes that define RMF Task M-4: Authorization Package Updates
List the references, processes and outcomes that define RMF Task M-5: Security and Privacy Reporting
List the references, processes and outcomes that define RMF Task M-6: Ongoing Authorization
List the references, processes and outcomes that define RMF Task M-7: System Disposal
Discuss Monitor step activities in the example system
8) CAP Certification Information
SpireTec solutions is the latest technology enabled I.Tmanagement training company specialized in offering 1500+ courses with the state of art training facilities backed by a team of industry experts in various domains with assuring best quality services.
Since SpireTec provides 24X7 training and support for your training needs is very adaptable to your time availabilities and offers customized training programs according to your availability and time zones of your contingent.
Because SpireTec aims for the personal & professional growth of you as individual & corporate as a whole, providing training on the latest and updated versions in the designated domains.
It is preferable but not mandatory to have domain experience in the area of your interest in which you want to opt training, supported by good English communication skills, a good Wi-Fi and computer or laptop system in case you want remote training.
Spire Tec aims and ensure to offer finest and world-class training to the participants by giving them a proper counselling and a guided career path by our industry experts which leads guaranteed success for you in the corporate world.
We offer online training (1-1, Group training), Classroom training, Onsite training with state of art facilities.
We use cookies
Some cookies are essential for this site to function and cannot be turned off. Others are set to help us
understand how our service performs and is used, and to support our marketing efforts.
Learn more in our
Terms &
Privacy Policy.