ISC2 - Certified in Governance, Risk and Compliance (CGRC)

Kesto

Kesto:

Vain 4 päivän

Menetelmä

Menetelmä:

luokkahuone / Online / Hybridi

Seuraava päivä

Seuraava päivä:

2/12/2024 (Maanantai)

Overview

Official ISC2 Training Provider

The Certified in Governance, Risk and Compliance (CGRC) is an information security practitioner who champions system security commensurate with an organization’s mission and risk tolerance, while meeting legal and regulatory requirements.

CGRC, is a vendor-neutral cybersecurity credential, demonstrates that you have the knowledge, skills and experience required for using various frameworks to manage risk and to authorize and maintain information systems.

At the end of this course, you’ll sit the ISC2 exam, and achieve your ISC2 Certified in Governance, Risk and Compliance (CGRC) certification.

Through Firebrand’s Lecture | Lab | Review methodology, you’ll get certified at twice the speed of the traditional training and get access to courseware, learn from certified instructors, and train in a distraction-free environment.

Audience

This course is ideal for:

  • IT, information security and cybersecurity practitioners who manage risk in information systems.
  • Any practitioner involved in authorizing and maintaining information systems.
  • Any of the following roles:
    • Authorizing Official
    • Cyber GRC Manager
    • Cybersecurity Auditor/Assessor
    • Cybersecurity Compliance Officer
    • Cybersecurity Architect
    • GRC Architect
    • GRC Information Technology Manager
    • GRC Manager
    • Cybersecurity Risk & Compliance Project Manager
    • Cybersecurity Risk & Controls Analyst
    • Cybersecurity Third Party Risk Manager
    • Enterprise Risk Manager
    • GRC Analyst
    • GRC Director
    • GRC Security Analyst
    • System Security Manager
    • System Security Officer
    • Information Assurance Manager
    • Cybersecurity Consultant

8 syytä, miksi kannattaa hankkia Firebrand Trainingiltä:

  1. Koulutuksen ja todistuksen saaminen kestää vain 4 päivän. Meidän kanssamme saat -koulutuksen ja -todistuksen ennätysajassa. Todistuksen ansaitset koulutuskeskuksessamme osana intensiivistä ja nopeutettua koulutusta.
  2. Hintaan sisältyy kaikki.Kertamaksu kattaa kaikki kurssimateriaalit, kokeet, kuljetuksen, majoituksen ja ateriat ja tarjoaa kustannustehokkaimman tavan hankkia koulutus ja todistus. Ilman mitään lisäkustannuksia.
  3. Suorita tutkinto ensimmäisellä kerralla tai kertaa koulutus ilmaiseksi. Tämä on takuumme. Olemme varmoja, että läpäiset -kurssin ensimmäisellä kerralla. Mutta jos näin ei käy, voit tulla takaisin vuoden kuluttua ja maksaa vain majoituksesta ja kokeista. Kaikki muu on ilmaista.
  4. Opit enemmän.Päivä perinteisen koulutuksen tarjoajan kanssa on yleensä klo 9–17, mihin sisältyy pitkä lounastauko. Firebrand Trainingiltä saat vähintään 12 tuntia päivässä keskittynyttä ja häiriötöntä laatukoulutusaikaa opettajasi kanssa.
  5. Opit nopeammin. Yhdistämme 3 eri oppimistyyliä (visuaalisen|kuuloon perustuvan|kosketukseen perustuvan) tarjotaksemme materiaalin tavalla joka varmistaa, että opit nopeammin ja helpommin.
  6. Opiskelet huippujen kanssa.Olemme kouluttaneet ja sertifioineet 134.561 ammattilaista ja olemme kumppaneita kaikkien alan suurien nimien kanssa ja olemme saaneet lukuisia palkintoja, mm. Microsoftin Danmarki Vuoden koulutuspartneri 2010, 2011, 2012 ja 2013, Institue of IT Trainingin ”Training Company of the Year 2006, 2007, 2008” Englannissa, ISC(2):n ”Highest Performing Affiliate of the Year 2009 & 2010 – EMEA” sekä EC-Councilin ”Accredited Training Centre of the Year 2010 og 2011”, ”Newcomer of the Year 2011” ja ”Instructors Circle of Excellence”.
  7. Opit enemmän kuin pelkän teorian. Olemme kehittäneet kurssia edelleen käyttämällä laboratorioita, esimerkkitapauksia ja harjoittelukokeita varmistaaksemme, että osaat soveltaa uutta tietoa työympäristöön.
  8. Opit parhailta. Ohjaajamme kurssilla ovat alan parhaita. He tarjoavat ainutlaatuisen yhdistelmän asiantuntemusta, kokemusta ja intohimoa opetukseen.

Benefits

Curriculum

Module 1: Information Security Risk Management Program

  • Understand the foundation of an organization information security risk management program
    • Principles of information security
    • Risk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organization for Standardization (ISO) 27001, International Organization for Standardization (ISO) 31000)
    • System Development Life Cycle (SDLC)
    • Information system boundary requirements
    • Security controls and practices
    • Roles and responsibilities in the authorization/approval process
  • Understand risk management program process
    • Select program management controls
    • Privacy requirements
    • Determine third-party hosted information systems
  • Understand regulatory and legal requirements
    • Familiarize with governmental, organizational and international regulatory security and privacy requirements (e.g., International Organization for Standardization (ISO) 27001, Federal Information Security Modernization Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
    • Familiarize with other applicable security-related mandates

Module 2: Scope of the Information System

  • Define the information system
    • Determine the scope of the information system
    • Describe the architecture (e.g., data flow, internal and external interconnections)
    • Describe information system purpose and functionality
  • Determine categorization of the information system
    • Identify the information types processed, stored or transmitted by the information system
    • Determine the impact level on confidentiality, integrity, and availability for each information type (e.g., Federal Information Processing Standards (FIPS) 199, International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
    • Determine information system categorization and document results

Module 3: Selection and Approval of Security and Privacy Controls

  • Identify and document baseline and inherited controls
  • Select and tailor controls to the system
    • Determine applicability of recommended baseline and inherited controls
    • Determine appropriate use of control enhancements (e.g., security practices, overlays, countermeasures)
    • Document control applicability
  • Develop continuous control monitoring strategy (e.g., implementation, timeline, effectiveness)
  • Review and approve security plan/Information Security Management System (ISMS)

Module 4: Implementation of Security and Privacy Controls

  • Implement selected controls
    • Determine mandatory configuration settings and verify implementation in accordance with current industry standards (e.g., Technical Security Standard for Information Technology (TSSIT), Technical Guideline for Minimum Security Measures, United States Government Configuration Baseline (USGCB), National Institute of Standards and Technology (NIST) checklists, Security Technical Implementation Guides (STIGs), Centre for Internet Security (CIS) benchmarks, General Data Protection Regulation (GDPR))
    • Ensure that implementation of controls is consistent with the organizational architecture and associated security and privacy architecture
    • Coordinate implementation of inherited controls with control providers
    • Determine and implement compensating/alternate security controls
    • Document control implementation
      • Document inputs to the planned controls, their expected behaviour and expected outputs or deviations
      • Verify the documented details of the controls meet the purpose, scope and risk profile of the information system
      • Obtain and document implementation details from appropriate organization entities (e.g., physical security, personnel security, privacy)

Module 5: Assessment/Audit of Security and Privacy Controls

  • Prepare for assessment/audit
    • Determine assessor/auditor requirements
    • Establish objectives and scope
    • Determine methods and level of effort
    • Determine necessary resources and logistics
    • Collect and review artefacts (e.g., previous assessments/audits, system documentation, policies)
    • Finalize the assessment/audit plan
  • Conduct assessment/audit
    • Collect and document assessment/audit evidence
    • Assess/audit implementation and validate compliance using approved assessment methods (e.g., interview, test, and examine)
  • Prepare the initial assessment/audit report
    • Analyse assessment/audit results and identify vulnerabilities
    • Propose remediation actions
  • Review initial assessment/audit report and perform remediation actions
    • Determine risk responses
    • Apply remediations
    • Reassess and validate the remediated controls
  • Develop final assessment/audit report
  • Develop remediation plan
    • Analyse identified residual vulnerabilities or deficiencies
    • Prioritize responses based on risk level
  • Identify resources (e.g. financial, personnel and technical) and determine the appropriate timeframe/schedule required to remediate deficiencies

Module 6: Authorization/Approval of Information System

  • Compile security and privacy authorization/approval documents
  • Compile required security and privacy documentation to support authorization/approval decision by the designated official
    • Determine information system risk
    • Evaluate information system risk
    • Determine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)
    • Determine residual risk
      • Authorize/approve information system
      • Determine terms of authorization/approval

Module 7: Continuous Monitoring

  • Determine impact of changes to information system and environment
    • Identify potential threat and impact to operation of information system and environment
    • Analyse risk due to proposed changes accounting for organizational risk tolerance
    • Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
    • Implement proposed changes
    • Validate changes have been correctly implemented
    • Ensure change management tasks are performed
  • Perform ongoing assessments/audits based on organizational requirements
    • Monitor network, physical and personnel activities (e.g., unauthorized assets, personnel and related activities)
    • Ensure vulnerability scanning activities are performed
    • Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)
  • Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency reports, news reports)
  • Actively participate in response planning and communication of a cyber event
    • Ensure response activities are coordinated with internal and external stakeholders
    • Update documentation, strategies and tactics incorporating lessons learned
  • Revise monitoring strategies based on changes to industry developments introduced through legal, regulatory, supplier, security and privacy updates
  • Keep designated officials updated about the risk posture for continuous authorization/approval
    • Determine ongoing information system risk
    • Update risk register, risk treatment, and remediation plan
  • Decommission information system
    • Determine information system decommissioning requirements
    • Communicate decommissioning of information system
    • Remove information system from operations

Exam Track

At the end of this accelerated course, you’ll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

ISC2 Certified in Governance, Risk and Compliance (CGRC) exam

  • Duration: 3 hours
  • Format: Multiple choice
  • Number of questions: 125
  • Passing score: 700 out of 1000 points
  • Languages: English
  • Domains:
    • 16% Continuous Monitoring
    • 16% Information Security Risk Management Program
    • 11% Scope of the Information System
    • 15% Selection and Approval of Security and Privacy Controls
    • 16% Implementation of Security and Privacy Controls
    • 16% Assessment/Audit of Security and Privacy Controls
    • 10% Authorization/Approval of Information System

Prerequisites

Before attending this accelerated course, you should have:

  • To qualify for the CGRC, you must pass the exam and have at least two years of cumulative, paid work experience in one or more of the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK®)
  • If you don’t yet have the required experience, you may become an Associate of ISC2 after successfully passing the CGRC exam. The Associate of ISC2 will then have three years to earn the experience needed for the CGRC certification.

Arvioinnit

Olemme kouluttaneet kymmenen vuoden aikana yli 134.561 opiskelijaa. Heitä kaikkia on pyydetty arvioimaan pikakurssimme. Tällä hetkellä 94,80% on sitä mieltä, että Firebrand on ylittänyt heidän odotuksensa:

"The Firebrand Training experience was fantastic from start to finish. Excellent facilities, knowledgeable and engaging instructors, and great customer service throughout. I would thoroughly recommend."
Wesley Parsons. (8/4/2024 (Maanantai) - 13/4/2024 (Lauantai))

"The course was excellent and well presented. Having an instructor for such a detailed and broad course was a tremendous help when preparing to sit the exam. Having passed the exam, I can happily say I don’t think I could have accomplished all I learnt within a week without Firebrand’s course."
Robert Fothergill. (8/4/2024 (Maanantai) - 13/4/2024 (Lauantai))

"With my personal experience I absolutely recommended learners to sign up with Firebrand. I felt confident for the exam after attending the course. Comparing my experience solving practise test and exam before and after attending the course, it went up from south to north."
Ashish Nair. (8/4/2024 (Maanantai) - 13/4/2024 (Lauantai))

"I had a great time attending the CISSP course because it gave me what I needed. A high level understanding of the material and valuable advice about how to prepare and tackle the exam. The course itself is challenging on its own but when you are with a group of like minded people it makes it fun to learn. For anyone considering taking the CISSP or using firebrand for your training, it’s a no-brainer."
Rushan Ratha. (8/4/2024 (Maanantai) - 13/4/2024 (Lauantai))

"A very intense course & a huge amount to cover in the relatively short 5-day window, but the course tutor pushes through the substantial content at a steady place & ensures the essential subject elements, plus question answering techniques, were pulled out for us to focus on for the exam."
I.B., IK Tech Limited. (8/4/2024 (Maanantai) - 13/4/2024 (Lauantai))

Kurssipäivämäärät

ISC2 - Certified in Governance, Risk and Compliance (CGRC)

Alkaa

Loppuu

Saatavuus

Rekisteröidy

29/10/2024 (Tiistai)

1/11/2024 (Perjantai)

Päättynyt - Jätä palautetta

 

2/12/2024 (Maanantai)

5/12/2024 (Torstai)

Rajoitettu määrä paikkoja

Rekisteröidy

17/3/2025 (Maanantai)

20/3/2025 (Torstai)

Paikkoja saatavilla

Rekisteröidy

7/5/2025 (Keskiviikko)

10/5/2025 (Lauantai)

Odotuslista

 

7/7/2025 (Maanantai)

10/7/2025 (Torstai)

Paikkoja saatavilla

Rekisteröidy

Uusimmat arvostelut opiskelijoiltamme