👇 CELEBRATE CLOUD SECURITY DAY 👇
00
HOURS
00
MINUTES
00
SECONDS
The CGRC – Governance, Risk and Compliance Certification is a professional credential designed for individuals involved in the governance, risk management, and compliance sectors. It focuses on equipping professionals with the knowledge and skills necessary to implement effective governance frameworks, manage organizational risk, and ensure compliance with regulatory requirements. This certification provides a comprehensive understanding of the principles, practices, and tools used in governance and compliance, enabling professionals to contribute effectively to their organizations' risk management strategies and compliance initiatives.
Why is CGRC – Governance, Risk and Compliance Certification important?
Who should take the CGRC – Governance, Risk and Compliance Certification Exam?
Skills Evaluated
Candidates taking the certification exam on the CGRC – Governance, Risk and Compliance Certification is evaluated for the following skills:
CGRC – Governance, Risk and Compliance Certification Certification Course Outline
The CGRC – Governance, Risk and Compliance Certification Certification covers the following topics -
1. Security and Privacy Governance, Risk Management, and Compliance Program - 16%
1.1 - Demonstrate knowledge in security and privacy governance, risk management, and compliance program
1.2 - Demonstrate knowledge in security and privacy governance, risk management and compliance program processes
1.3 - Demonstrate knowledge of compliance frameworks, regulations, privacy, and security requirements
2. Scope of the System - 10%
2.1 - Describe the system
2.2 - Determine security compliance required
3. Selection and Approval of Framework, Security, and Privacy Controls - 14%
3.1 - Identify and document baseline and inherited controls
3.2 - Select and tailor controls
4. Implementation of Security and Privacy Controls - 17%
4.1 - Develop implementation strategy (e.g., resourcing, funding, timeline, effectiveness)
4.2 - Implement selected controls
4.3 - Document control implementation
5. Assessment/Audit of Security and Privacy Controls - 16%
5.1 - Prepare for assessment/audit
5.2 - Conduct assessment/audit
5.3 - Prepare the initial assessment/audit report
5.4 - Review initial assessment/audit report and plan risk response actions
5.5 - Develop final assessment/audit report
5.6 - Develop risk response plan
6. System Compliance - 14%
6.1 - Review and submit security/privacy documents
6.2 - Determine system risk posture
6.3 - Document system compliance
7. Compliance Maintenance - 13%
7.1 - Perform system change management
7.2 - Perform ongoing compliance activities based on requirements
7.3 - Engage in audits activities based on compliance requirements
7.4 - Decommission system when applicable
(Based on 359 reviews)
No reviews yet. Be the first to review!