Continuous Monitoring for CGRC
How do you ensure that an information system remains secure throughout its operational life cycle? This course will teach you the skills of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Information systems may have been designed and implemented securely, but over time the effectiveness of the security controls may diminish. In this course, Continuous Monitoring for CGRC, you’ll learn to identify and resolve risks associated with information systems operations. First, you’ll explore the impact of changes in the operational environment. Next, you’ll discover cyber security event response. Finally, you’ll learn how to maintain secure operating conditions until the time of system decommissioning. When you’re finished with this course, you’ll have the skills and knowledge of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Author Name: Kevin Henry
Author Description:
Kevin Henry is a well-known and respected educator and lecturer in the fields of information security and audit. Kevin uses his more than 30 years of practical experience as a network technician, computer programmer, and information systems auditor to deliver outstanding presentations that make each topic interesting, relevant, and useful. Often described by students as “The best instructor I have ever had,” Kevin has the ability to provide quality instruction that engages the audience and provi… more
Table of Contents
- Course Overview
1min - Assess Operational Risks
21mins - Cyber Security Incident Response
20mins - System Decommissioning
11mins - Domain Summary
4mins
There are no reviews yet.