Udemy - CGRC Certification Masterclass
- Category Other
- Type Tutorials
- Language English
- Total size 3.2 GB
- Uploaded By freecoursewb
- Downloads 103
- Last checked 4 days ago
- Date uploaded 5 months ago
- Seeders 2
- Leechers 3
Infohash : 1CE5E4DF14675CA2D566F3FB966B7E6BF337B6DF
CGRC Certification Masterclass
https://WebToolTip.com
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.24 GB | Duration: 10h 39m
Your Complete Guide to ISACA’s CGRC Certification – Risk, Security & Compliance Demystified
What you'll learn
Understand the full lifecycle of risk management and security authorization using frameworks like NIST RMF.
Learn how to assess, select, implement, and monitor security and privacy controls effectively.
Gain practical knowledge to support compliance with regulations and standards across different industries.
Prepare confidently for the CGRC certification exam with real-world examples and exam-oriented strategies.
Requirements
A basic understanding of information security or IT systems is helpful but not mandatory.
Familiarity with cybersecurity frameworks like NIST, ISO 27001, or risk management concepts is an advantage.
No prior experience with the CGRC exam is required—this course is designed to guide both beginners and experienced professionals.
Files:
[ WebToolTip.com ] Udemy - CGRC Certification Masterclass- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Overview of CGRC Certification
- 1 - Introduction to CGRC.mp4 (39.1 MB)
- 2 - Course Structure and Objectives.mp4 (14.9 MB)
- 31 - Stakeholders Roles Responsibilities.mp4 (38.4 MB)
- 32 - Objectives Scope and Schedule.mp4 (41.4 MB)
- 33 - Assets Method and Level of Effort.mp4 (40.5 MB)
- 34 - Compliance Demonstration.mp4 (44.1 MB)
- 35 - Finalization of Audit Plan.mp4 (44.4 MB)
- 36 - Compliance Verification.mp4 (42.2 MB)
- 37 - Evidence Verification and Validation.mp4 (41.7 MB)
- 38 - Identification of Risks.mp4 (44.0 MB)
- 39 - Risk Mitigation Summary.mp4 (48.4 MB)
- 40 - Recording of Preliminary Findings.mp4 (50.9 MB)
- 41 - Assignment of Risk Response.mp4 (45.6 MB)
- 42 - Collaboration of Risk Response.mp4 (50.1 MB)
- 43 - Recording of Preliminary Findings.mp4 (43.3 MB)
- 44 - Documentation of Final Compliance.mp4 (46.1 MB)
- 45 - Documentation of Recommendations.mp4 (40.8 MB)
- 46 - Identification of Residual Risk.mp4 (48.8 MB)
- 47 - Prioritization of Risks.mp4 (49.0 MB)
- 48 - Identification of Required Resources.mp4 (46.8 MB)
- 49 - Security and Privacy Documentation.mp4 (50.1 MB)
- 50 - System Risk Acceptance Criteria.mp4 (39.2 MB)
- 51 - Determination of Residual Risk.mp4 (44.5 MB)
- 52 - Stakeholder Concurrence for Risk Treatment.mp4 (41.7 MB)
- 53 - Defining Residual Risks.mp4 (44.0 MB)
- 54 - Formal Notification.mp4 (52.2 MB)
- 55 - Sharing of Formal Notification.mp4 (42.1 MB)
- 56 - Impact of Changes.mp4 (33.7 MB)
- 57 - Documentation of Proposed Changes.mp4 (32.6 MB)
- 58 - Deploy to the Environment.mp4 (37.5 MB)
- 59 - Tracking System Changes.mp4 (29.3 MB)
- 10 - Roles and Responsibilities for Compliance Activities and Associated Frameworks.mp4 (65.0 MB)
- 3 - Principles of Governance Risk Management and Compliance.mp4 (31.3 MB)
- 4 - Risk Management and Compliance Frameworks.mp4 (44.2 MB)
- 5 - System Development Life Cycle SDLC.mp4 (142.9 MB)
- 6 - Information Lifecycle.mp4 (79.3 MB)
- 7 - Confidentiality Integrity Availability Nonrepudiation and Privacy Concepts.mp4 (78.7 MB)
- 8 - System Assets and Boundary Descriptions.mp4 (48.9 MB)
- 9 - Security and Privacy Controls and Requirements.mp4 (63.2 MB)
- 60 - Establishing Frequency.mp4 (40.6 MB)
- 61 - Monitoring of Systems and Assets.mp4 (43.7 MB)
- 62 - Incident Response and Contingency.mp4 (41.4 MB)
- 63 - Performing Security Updates.mp4 (40.7 MB)
- 64 - Evidence Collection and Performance Testing.mp4 (51.1 MB)
- 65 - Awareness and Training.mp4 (39.3 MB)
- 66 - Revising Monitoring Strategies.mp4 (40.7 MB)
- 67 - Testing and Vulnerabilities Scanning.mp4 (47.0 MB)
- 68 - Conduction of Personnel Interviews.mp4 (44.9 MB)
- 69 - Review and Updation of Documentation.mp4 (45.8 MB)
- 70 - Requirement for System Decomission.mp4 (40.1 MB)
- 71 - Removing System from Operations.mp4 (38.9 MB)
- 72 - Documentation of the Decomissioned System.mp4 (30.5 MB)
- 11 - Establishment of Compliance Program for the Applicable Framework.mp4 (48.9 MB)
- 12 - Familiarity with Compliance Frameworks.mp4 (47.9 MB)
- 13 - Familiarity with Other National and International Laws and Requirements.mp4 (55.5 MB)
- 14 - System Definition and Scope.mp4 (35.7 MB)
- 15 - System Purpose and Functionality.mp4 (36.2 MB)
- 16 - Types of Information.mp4 (42.4 MB)
- 17 - Security Objectives.mp4 (42.4 MB)
- 18 - Determination of Risk Impact Level.mp4 (43.8 MB)
- 19 - Applicable Baselines.mp4 (53.8 MB)
- 20 - Appropriate Control Enhancements.mp4 (40.4 MB)
- 21 - Specific Data Handling.mp4 (40.5 MB)
- 22 - Control Selection Documentation.mp4 (37.6 MB)
- 23 - Control Allocation and Stakeholder Agreement.mp4 (40.8 MB)
- 24 - Alignment of Control Implementation.mp4 (46.9 MB)
- 25 - Identification of Control Types.mp4 (41.4 MB)
- 26 - Frequency of Compliance Documentation.mp4 (49.3 MB)
- 27 - Control Implementation.mp4 (54.2 MB)
- 28 - Compensating Controls.mp4 (53.8 MB)
- 29 - Residual Security Risks.mp4 (52.5 MB)
- 30 - Implemented Controls.mp4 (44.8 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce