وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

Mastering Governance, Risk, and Compliance (GRC) A Complete

سرفصل های دوره

1 - Introduction
  • 1 -01 - GRC Essentials - A Risk Managers playbook to IT Security Governance, Risk
  • 2 -02 - Course Objectives
  • 3 -03 - Course Audience
  • 4 -04 - Before we take off - Some Ground Rules
  • 5 -05 - Fair Disclaimer
  • 6 -06 - Some Not So Fun Facts about Cybersecurity

  • 2 - Module 1 - What is Governance Risk and Compliance - Quite Literally
  • 1 -07 - Why This Module
  • 2 -08 - What is Governance - Part 1
  • 3 -09 - What is Governance - Part 2
  • 4 -10 - What is Risk
  • 5 -11 - What is Compliance
  • 6 -12 - Risk Analyst and Risk Manager
  • 7 -13 - Quick Exercise
  • 8 -13.a - Extension Fun Fact

  • 3 - Module 2 - The three lines of Defense
  • 1 -14 History and Relevance
  • 2 -15 First Line (Part 1)
  • 3 -16 First Line (Part 2)
  • 4 -17 Second Line
  • 5 -18 Third Line
  • 6 -19 How does this help
  • 7 -20 Things to unlearn - One Size Fits All

  • 4 - Module 3-Step 1 Information Gathering-Understand the organisation risk universe
  • 1 -21 Recap & Back to problem statement-edited
  • 2 -22 Map your Information Security risk universe for ABC Inc
  • 3 -23 Infrastructure - Compute & Workstation
  • 4 -24 Business Applications
  • 5 -25 Third Parties
  • 6 -26 End Users
  • 7 -27 Physical Perimeter
  • 8 -28 Revenue Stream - Client Services and Products
  • 9 -29 Outcome
  • 10 -30 Things to Unlearn - Start with Risks and not Controls

  • 5 - Module 4 - Step 2 Drafting inherent risks
  • 1 -31 What is Inherent Risk
  • 2 -32 How to identify Inherent Risks
  • 3 -33 Time for templates!
  • 4 -34 Drafting Inherent Risks - Infrastructure - Compute - Part 1
  • 5 -35 Drafting Inherent Risks - Infrastructure - Compute - Part 2
  • 6 -36 Drafting Inherent Risks - Infrastructure - Workstations
  • 7 -37 Drafting Inherent Risks - Business Applications - Part 1
  • 8 -38 Drafting Inherent Risks - Business Applications - Part 2
  • 9 -39 Drafting Inherent Risks - Third Parties
  • 10 -40 Drafting Inherent Risks - End Users
  • 11 -41 Drafting Inherent Risks - Physical Perimeter
  • 12 -42 Drafting Inherent Risks - Revenue Stream Client Service or Products
  • 13 -43 A quick pressure test with ISO 27001

  • 6 - Module 5 - Step 3 Mapping the Lines of Defense - Roles and Responsibilities
  • 1 -44 Mapping the First Line - Part 1
  • 2 -45 Mapping the First Line - Part 2
  • 3 -46 Mapping the Second Line
  • 4 -47 Mapping the Third Line

  • 7 - Module 6 - Step 4 Existing Controls Environment
  • 1 -48 A Much Needed Recap
  • 2 -49 Existing Policies, Mitigations and Controls - Part 1
  • 3 -50 Existing Policies, Mitigations and Controls Part 2
  • 4 -51 Key points to identify existing mitigations

  • 8 - Module 7 - Step 5 Residual Risk
  • 1 -52 What is Residual Risk
  • 2 -53 Things to Unlearn - There is no -- No Risk

  • 9 - Module 8 - Follow Through
  • 1 -54 Remediation & Oversight
  • 2 -55 Management Reporting - Strategic vs Operational

  • 10 - Module 9 - Bringing it all together
  • 1 -56 End to End Framework
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44649
    حجم: 2624 مگابایت
    مدت زمان: 179 دقیقه
    تاریخ انتشار: ۲۵ اردیبهشت ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید