Udemy - CGRC Certification Masterclass

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 3.2 GB
  • Uploaded By freecoursewb
  • Downloads 103
  • Last checked 4 days ago
  • Date uploaded 5 months ago
  • Seeders 2
  • Leechers 3

Infohash : 1CE5E4DF14675CA2D566F3FB966B7E6BF337B6DF



CGRC Certification Masterclass

https://WebToolTip.com

Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.24 GB | Duration: 10h 39m

Your Complete Guide to ISACA’s CGRC Certification – Risk, Security & Compliance Demystified

What you'll learn
Understand the full lifecycle of risk management and security authorization using frameworks like NIST RMF.
Learn how to assess, select, implement, and monitor security and privacy controls effectively.
Gain practical knowledge to support compliance with regulations and standards across different industries.
Prepare confidently for the CGRC certification exam with real-world examples and exam-oriented strategies.

Requirements
A basic understanding of information security or IT systems is helpful but not mandatory.
Familiarity with cybersecurity frameworks like NIST, ISO 27001, or risk management concepts is an advantage.
No prior experience with the CGRC exam is required—this course is designed to guide both beginners and experienced professionals.

Files:

[ WebToolTip.com ] Udemy - CGRC Certification Masterclass
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Overview of CGRC Certification
    • 1 - Introduction to CGRC.mp4 (39.1 MB)
    • 2 - Course Structure and Objectives.mp4 (14.9 MB)
    10 - Assessment Audit Preparation
    • 31 - Stakeholders Roles Responsibilities.mp4 (38.4 MB)
    • 32 - Objectives Scope and Schedule.mp4 (41.4 MB)
    • 33 - Assets Method and Level of Effort.mp4 (40.5 MB)
    • 34 - Compliance Demonstration.mp4 (44.1 MB)
    • 35 - Finalization of Audit Plan.mp4 (44.4 MB)
    11 - Performing AssessmentAudit
    • 36 - Compliance Verification.mp4 (42.2 MB)
    • 37 - Evidence Verification and Validation.mp4 (41.7 MB)
    12 - Preparation of Audit Report
    • 38 - Identification of Risks.mp4 (44.0 MB)
    • 39 - Risk Mitigation Summary.mp4 (48.4 MB)
    • 40 - Recording of Preliminary Findings.mp4 (50.9 MB)
    13 - Review Initial Audit Report
    • 41 - Assignment of Risk Response.mp4 (45.6 MB)
    • 42 - Collaboration of Risk Response.mp4 (50.1 MB)
    • 43 - Recording of Preliminary Findings.mp4 (43.3 MB)
    14 - Preparation of Final Audit Report
    • 44 - Documentation of Final Compliance.mp4 (46.1 MB)
    • 45 - Documentation of Recommendations.mp4 (40.8 MB)
    15 - Development of Risk Response Plan
    • 46 - Identification of Residual Risk.mp4 (48.8 MB)
    • 47 - Prioritization of Risks.mp4 (49.0 MB)
    • 48 - Identification of Required Resources.mp4 (46.8 MB)
    16 - SecurityPrivacy Documentation Review
    • 49 - Security and Privacy Documentation.mp4 (50.1 MB)
    17 - System Risk Posture
    • 50 - System Risk Acceptance Criteria.mp4 (39.2 MB)
    • 51 - Determination of Residual Risk.mp4 (44.5 MB)
    • 52 - Stakeholder Concurrence for Risk Treatment.mp4 (41.7 MB)
    • 53 - Defining Residual Risks.mp4 (44.0 MB)
    18 - System Compliance Docuementation
    • 54 - Formal Notification.mp4 (52.2 MB)
    • 55 - Sharing of Formal Notification.mp4 (42.1 MB)
    19 - System Change Management
    • 56 - Impact of Changes.mp4 (33.7 MB)
    • 57 - Documentation of Proposed Changes.mp4 (32.6 MB)
    • 58 - Deploy to the Environment.mp4 (37.5 MB)
    • 59 - Tracking System Changes.mp4 (29.3 MB)
    2 - Security and Privacy Governance Risk Management and Compliance Program
    • 10 - Roles and Responsibilities for Compliance Activities and Associated Frameworks.mp4 (65.0 MB)
    • 3 - Principles of Governance Risk Management and Compliance.mp4 (31.3 MB)
    • 4 - Risk Management and Compliance Frameworks.mp4 (44.2 MB)
    • 5 - System Development Life Cycle SDLC.mp4 (142.9 MB)
    • 6 - Information Lifecycle.mp4 (79.3 MB)
    • 7 - Confidentiality Integrity Availability Nonrepudiation and Privacy Concepts.mp4 (78.7 MB)
    • 8 - System Assets and Boundary Descriptions.mp4 (48.9 MB)
    • 9 - Security and Privacy Controls and Requirements.mp4 (63.2 MB)
    20 - Ongoing Compliance
    • 60 - Establishing Frequency.mp4 (40.6 MB)
    • 61 - Monitoring of Systems and Assets.mp4 (43.7 MB)
    • 62 - Incident Response and Contingency.mp4 (41.4 MB)
    • 63 - Performing Security Updates.mp4 (40.7 MB)
    • 64 - Evidence Collection and Performance Testing.mp4 (51.1 MB)
    • 65 - Awareness and Training.mp4 (39.3 MB)
    • 66 - Revising Monitoring Strategies.mp4 (40.7 MB)
    21 - Audit Activities Based on Compliance
    • 67 - Testing and Vulnerabilities Scanning.mp4 (47.0 MB)
    • 68 - Conduction of Personnel Interviews.mp4 (44.9 MB)
    • 69 - Review and Updation of Documentation.mp4 (45.8 MB)
    22 - Decomission System
    • 70 - Requirement for System Decomission.mp4 (40.1 MB)
    • 71 - Removing System from Operations.mp4 (38.9 MB)
    • 72 - Documentation of the Decomissioned System.mp4 (30.5 MB)
    3 - Security and Privacy Governance Risk Management and Compliance Program Processe
    • 11 - Establishment of Compliance Program for the Applicable Framework.mp4 (48.9 MB)
    4 - Compliance Frameworks Regulations Privacy and Security Requirements
    • 12 - Familiarity with Compliance Frameworks.mp4 (47.9 MB)
    • 13 - Familiarity with Other National and International Laws and Requirements.mp4 (55.5 MB)
    5 - Scope of the System
    • 14 - System Definition and Scope.mp4 (35.7 MB)
    • 15 - System Purpose and Functionality.mp4 (36.2 MB)
    • 16 - Types of Information.mp4 (42.4 MB)
    • 17 - Security Objectives.mp4 (42.4 MB)
    • 18 - Determination of Risk Impact Level.mp4 (43.8 MB)
    6 - Baseline and Inherited Controls
    • 19 - Applicable Baselines.mp4 (53.8 MB)
    • 20 - Appropriate Control Enhancements.mp4 (40.4 MB)
    • 21 - Specific Data Handling.mp4 (40.5 MB)
    • 22 - Control Selection Documentation.mp4 (37.6 MB)
    • 23 - Control Allocation and Stakeholder Agreement.mp4 (40.8 MB)
    7 - Develop Implementation Strategy
    • 24 - Alignment of Control Implementation.mp4 (46.9 MB)
    • 25 - Identification of Control Types.mp4 (41.4 MB)
    • 26 - Frequency of Compliance Documentation.mp4 (49.3 MB)
    8 - Implementation of Selected Controls
    • 27 - Control Implementation.mp4 (54.2 MB)
    • 28 - Compensating Controls.mp4 (53.8 MB)
    9 - Documentation of Control Implementation
    • 29 - Residual Security Risks.mp4 (52.5 MB)
    • 30 - Implemented Controls.mp4 (44.8 MB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
GDRIVE-CACHE 📁 GD (hit) | ID: 1JgsQ3cizU... 📄 torrent 🕐 09 Jan 2026, 06:10:33 pm IST ⏰ 03 Feb 2026, 06:10:30 pm IST ✅ Valid for 17d 2h 🔄 Refresh Cache