وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Mastering Governance, Risk, and Compliance (GRC) A Complete

سرفصل های دوره

1 - Introduction
  • 1 -01 - GRC Essentials - A Risk Managers playbook to IT Security Governance, Risk
  • 2 -02 - Course Objectives
  • 3 -03 - Course Audience
  • 4 -04 - Before we take off - Some Ground Rules
  • 5 -05 - Fair Disclaimer
  • 6 -06 - Some Not So Fun Facts about Cybersecurity

  • 2 - Module 1 - What is Governance Risk and Compliance - Quite Literally
  • 1 -07 - Why This Module
  • 2 -08 - What is Governance - Part 1
  • 3 -09 - What is Governance - Part 2
  • 4 -10 - What is Risk
  • 5 -11 - What is Compliance
  • 6 -12 - Risk Analyst and Risk Manager
  • 7 -13 - Quick Exercise
  • 8 -13.a - Extension Fun Fact

  • 3 - Module 2 - The three lines of Defense
  • 1 -14 History and Relevance
  • 2 -15 First Line (Part 1)
  • 3 -16 First Line (Part 2)
  • 4 -17 Second Line
  • 5 -18 Third Line
  • 6 -19 How does this help
  • 7 -20 Things to unlearn - One Size Fits All

  • 4 - Module 3-Step 1 Information Gathering-Understand the organisation risk universe
  • 1 -21 Recap & Back to problem statement-edited
  • 2 -22 Map your Information Security risk universe for ABC Inc
  • 3 -23 Infrastructure - Compute & Workstation
  • 4 -24 Business Applications
  • 5 -25 Third Parties
  • 6 -26 End Users
  • 7 -27 Physical Perimeter
  • 8 -28 Revenue Stream - Client Services and Products
  • 9 -29 Outcome
  • 10 -30 Things to Unlearn - Start with Risks and not Controls

  • 5 - Module 4 - Step 2 Drafting inherent risks
  • 1 -31 What is Inherent Risk
  • 2 -32 How to identify Inherent Risks
  • 3 -33 Time for templates!
  • 4 -34 Drafting Inherent Risks - Infrastructure - Compute - Part 1
  • 5 -35 Drafting Inherent Risks - Infrastructure - Compute - Part 2
  • 6 -36 Drafting Inherent Risks - Infrastructure - Workstations
  • 7 -37 Drafting Inherent Risks - Business Applications - Part 1
  • 8 -38 Drafting Inherent Risks - Business Applications - Part 2
  • 9 -39 Drafting Inherent Risks - Third Parties
  • 10 -40 Drafting Inherent Risks - End Users
  • 11 -41 Drafting Inherent Risks - Physical Perimeter
  • 12 -42 Drafting Inherent Risks - Revenue Stream Client Service or Products
  • 13 -43 A quick pressure test with ISO 27001

  • 6 - Module 5 - Step 3 Mapping the Lines of Defense - Roles and Responsibilities
  • 1 -44 Mapping the First Line - Part 1
  • 2 -45 Mapping the First Line - Part 2
  • 3 -46 Mapping the Second Line
  • 4 -47 Mapping the Third Line

  • 7 - Module 6 - Step 4 Existing Controls Environment
  • 1 -48 A Much Needed Recap
  • 2 -49 Existing Policies, Mitigations and Controls - Part 1
  • 3 -50 Existing Policies, Mitigations and Controls Part 2
  • 4 -51 Key points to identify existing mitigations

  • 8 - Module 7 - Step 5 Residual Risk
  • 1 -52 What is Residual Risk
  • 2 -53 Things to Unlearn - There is no -- No Risk

  • 9 - Module 8 - Follow Through
  • 1 -54 Remediation & Oversight
  • 2 -55 Management Reporting - Strategic vs Operational

  • 10 - Module 9 - Bringing it all together
  • 1 -56 End to End Framework
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44649
    حجم: 2624 مگابایت
    مدت زمان: 179 دقیقه
    تاریخ انتشار: ۲۵ اردیبهشت ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید