Continuous Monitoring for CGRC
Offered By: Pluralsight
Course Description
Overview
How do you ensure that an information system remains secure throughout its operational life cycle? This course will teach you the skills of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Information systems may have been designed and implemented securely, but over time the effectiveness of the security controls may diminish. In this course, Continuous Monitoring for CGRC, you’ll learn to identify and resolve risks associated with information systems operations. First, you’ll explore the impact of changes in the operational environment. Next, you’ll discover cyber security event response. Finally, you’ll learn how to maintain secure operating conditions until the time of system decommissioning. When you’re finished with this course, you’ll have the skills and knowledge of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Information systems may have been designed and implemented securely, but over time the effectiveness of the security controls may diminish. In this course, Continuous Monitoring for CGRC, you’ll learn to identify and resolve risks associated with information systems operations. First, you’ll explore the impact of changes in the operational environment. Next, you’ll discover cyber security event response. Finally, you’ll learn how to maintain secure operating conditions until the time of system decommissioning. When you’re finished with this course, you’ll have the skills and knowledge of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.
Syllabus
- Course Overview 1min
- Assess Operational Risks 21mins
- Cyber Security Incident Response 20mins
- System Decommissioning 11mins
- Domain Summary 4mins
Taught by
Kevin Henry
Related Courses
Cyber Security in ManufacturingUniversity at Buffalo via Coursera Microsoft Azure DevOps Engineer: Recommend and Design System Feedback Mechanisms
Pluralsight Security Event Triage: Operationalizing Security Analysis
Pluralsight Utilizing Zeek in an Enterprise Environment or for Distributed Operations
Pluralsight Enterprise Security
Udacity