We may earn an affiliate commission when you visit our partners.
Kevin Henry

How do you ensure that an information system remains secure throughout its operational life cycle? This course will teach you the skills of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.

Read more

How do you ensure that an information system remains secure throughout its operational life cycle? This course will teach you the skills of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.

Information systems may have been designed and implemented securely, but over time the effectiveness of the security controls may diminish. In this course, Continuous Monitoring for CGRC, you’ll learn to identify and resolve risks associated with information systems operations. First, you’ll explore the impact of changes in the operational environment. Next, you’ll discover cyber security event response. Finally, you’ll learn how to maintain secure operating conditions until the time of system decommissioning. When you’re finished with this course, you’ll have the skills and knowledge of continuous monitoring needed for the Certified in Governance, Risk, and Compliance examination.

Enroll now

What's inside

Syllabus

Course Overview
Assess Operational Risks
Cyber Security Incident Response
System Decommissioning
Read more
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores continuous monitoring, which is key for CGRC certification
Kevin Henry is a recognized instructor, which can boost confidence
Examines changes in the operational environment, which is relevant for CGRC
Develops skills for responding to cyber security events, which is key in CGRC
Teaches how to maintain secure operating conditions, which is essential for CGRC

Save this course

Save Continuous Monitoring for CGRC to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Continuous Monitoring for CGRC with these activities:
Organize and review course materials
Consolidate and review course materials to improve retention and understanding.
Show steps
  • Gather and organize all course materials
  • Review materials regularly
  • Create summaries and notes
Review network security Concepts
Reviewing concepts of network security will help you build a foundation for this course.
Browse courses on network security
Show steps
  • Revisit OSI model and TCP/IP model
  • Review common network attacks and defense mechanisms
  • Practice configuring network security devices
Review material from previous courses in IT governance and risk management
Start the course with a refresher on previous IT governance, risk management, and IT security courses to build upon the foundation needed to succeed in this course.
Browse courses on IT Governance
Show steps
  • Identify previous coursework in IT governance, risk management, and security
  • Review course notes, assignments, and exams
  • Complete practice questions and quizzes
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Review Security Best Practices
Refersh your knowledge of security best practices gained from prior coursework or professional experience before you start the course to fill in any knowledge gaps and make you more successful in the course.
Browse courses on Security
Show steps
  • Consult former coursework or texts to identify the security topics covered in the course.
  • Read about each topic to familiarize yourself with the terminilogy and principles.
Compile a list of resources on continuous monitoring for CGRC
Create a curated list of resources to provide a comprehensive reference for continuous monitoring for CGRC.
Browse courses on Continuous Monitoring
Show steps
  • Search for reputable sources on continuous monitoring for CGRC
  • Organize resources into a structured format
  • Annotate and provide context for each resource
Follow video tutorials on continuous monitoring for CGRC
Supplement course materials with video tutorials to enhance understanding of continuous monitoring for CGRC.
Browse courses on Continuous Monitoring
Show steps
  • Identify reputable sources for video tutorials
  • Watch tutorials on topics of interest
  • Take notes and summarize key points
Practice Cyber Security Event Response
Cyber security incident response is an essential component of any security plan. Practicing incident response before taking the course will help prepare you for future challenges.
Show steps
  • Simulate a cyber security event.
  • Develop a plan for responding to the event.
  • Review your response and make adjustments.
Practice monitoring for changes and risks
Practice identifying and assessing risks associated with information systems operations to reinforce your understanding of continuous monitoring.
Browse courses on Continuous Monitoring
Show steps
  • Review the course materials on identifying and assessing risks.
  • Gather real-world examples of information systems vulnerabilities.
  • Conduct a risk assessment for an information system.
Attend industry conferences and meetups on CGRC
Attend industry conferences and meetups to connect with professionals in the field and gain insights on CGRC trends.
Browse courses on CGRC
Show steps
  • Identify and register for relevant industry events
  • Prepare for networking and engagement
  • Attend sessions and participate in discussions
Create an Operational Security Plan
Creating an operational security plan can help you ensure you understand the course material on creating and implementing a security plan during the course.
Browse courses on Security Operations
Show steps
  • Identify the threats to your information system.
  • Develop strategies to mitigate the threats.
  • Write an operational security plan that describes your strategies.
Write a blog post on cyber security incident response
Create a blog post that outlines the steps involved in cyber security incident response, solidifying your knowledge of the process.
Browse courses on Incident Management
Show steps
  • Research and gather information on cyber security incident response.
  • Outline the steps of cyber security incident response in a logical order.
  • Write a draft of your blog post, ensuring clarity and comprehensiveness.
  • Proofread and edit your blog post for accuracy and readability.
  • Publish your blog post on a relevant platform.
Complete CGRC practice questions and mock exams
Complete practice questions and mock exams to assess understanding of CGRC concepts and prepare for the certification exam.
Browse courses on CGRC
Show steps
  • Gather CGRC practice questions and mock exams
  • Complete practice questions and track progress
  • Review incorrect answers and focus on areas for improvement
Write a blog post or article on a CGRC topic
Create a blog post or article on a CGRC topic to synthesize knowledge and reinforce understanding.
Browse courses on CGRC
Show steps
  • Choose a specific CGRC topic
  • Research and gather information
  • Organize and write the content
  • Publish and distribute the blog post or article

Career center

Learners who complete Continuous Monitoring for CGRC will develop knowledge and skills that may be useful to these careers:
Information Systems Manager
Information Systems Managers typically need a master's degree in information systems or computer science. This course, Continuous Monitoring for CGRC, teaches the skills of continuous monitoring as well as cyber security event response. These skills may be helpful for the work of an Information Systems Manager, in which one ensures that an information system remains secure throughout its operational life cycle.
Chief Information Security Officer
Chief Information Security Officers often need an MBA or master's degree in information security. Continuous Monitoring for CGRC teaches the skills needed for the Certified in Governance, Risk, and Compliance examination. This course may help build a foundation for a career in this field. Continuous monitoring is important for identifying and resolving risks associated with information systems operations and can help ensure that an information system remains secure throughout its operational life cycle.
Cybersecurity Analyst
Many Cybersecurity Analysts have at least a bachelor's degree in computer science, information systems, or a related field. Continuous Monitoring for CGRC teaches cyber security event response, which may be helpful for a Cybersecurity Analyst. This course also teaches skills needed for the Certified in Governance, Risk, and Compliance examination. Maintaining secure operating conditions is important for a Cybersecurity Analyst, as well as skills in dealing with cyber security events.
Information Security Engineer
Information Security Engineers often have a bachelor's degree in computer science or a related field. Continuous Monitoring for CGRC teaches skills needed for the Certified in Governance, Risk, and Compliance examination, which may help advance a career in this field. This course also teaches cyber security event response, which is an important skill for ensuring that an information system remains secure throughout its operational life cycle.
Information Security Consultant
Information Security Consultants often hold at least a bachelor's degree in computer science or information systems. Continuous Monitoring for CGRC teaches skills needed for the Certified in Governance, Risk, and Compliance examination, which can help advance a career in this field. This course also teaches cyber security event response, which is important for helping clients maintain secure operating conditions.
IT Security Analyst
This role often requires at least a bachelor's degree in a field such as information systems or computer science. Continuous Monitoring for CGRC teaches the skills needed for the Certified in Governance, Risk, and Compliance examination, which can help advance a career in this field. This course can help one understand the impact of changes in the operational environment as well as how to manage cyber security events.
Compliance Manager
Many Compliance Managers have a bachelor's degree in a related field, such as business or information systems. Continuous Monitoring for CGRC teaches the skills needed for the Certified in Governance, Risk, and Compliance examination, which can help advance a career in this field. This course covers assessing operational risks, which is important for Compliance Managers.
Security Analyst
Security Analysts typically need at least a bachelor's degree in a field such as computer science or information systems. Continuous Monitoring for CGRC teaches the skills needed for the Certified in Governance, Risk, and Compliance examination, which can help advance a career in this field.
Systems Analyst
A bachelor's degree in operations research, computer science, or management information systems is usually required for this role. Continuous Monitoring for CGRC can help one understand the impact of changes in the operational environment when dealing with information systems.
Risk Analyst
A bachelor's degree in business, finance, or a related field is usually required for this role. Continuous Monitoring for CGRC teaches skills needed for the Certified in Governance, Risk, and Compliance examination, which may help advance a career in this field. This course teaches one to assess operational risks, which is important for Risk Analysts.
Privacy Analyst
A bachelor's degree in computer science, information systems, or a related field is usually required for this role. Continuous Monitoring for CGRC teaches cyber security event response, which is important for Privacy Analysts. This course also may help build a foundation for the skills needed for the Certified in Governance, Risk, and Compliance examination.
Data Analyst
Data Analysts often need at least a bachelor's degree in a field such as computer science or statistics. Continuous Monitoring for CGRC teaches cyber security event response, which is important for Data Analysts who deal with sensitive information. This course also may help build a foundation for the skills needed for the Certified in Governance, Risk, and Compliance examination.
IT Architect
IT Architects typically need at least a bachelor's degree in computer science or a related field. Continuous Monitoring for CGRC may help build a foundation for a career in this field.
IT Manager
IT Managers often need at least a bachelor's degree in computer science or a related field. Continuous Monitoring for CGRC may help build a foundation for a career in this field.
IT Auditor
A bachelor's degree in accounting or a related field is usually required for this role. Continuous Monitoring for CGRC may help build a foundation for a career in this field. This course teaches assessment of operational risks, which is important for IT Auditors.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Continuous Monitoring for CGRC.
A concise guide to the ISO 27001:2013 information security management standard, which includes requirements for continuous monitoring. Useful as a reference tool and for gaining an understanding of the standard.
A guide to continuous monitoring in healthcare organizations, covering specific challenges and considerations. Provides valuable insights for those working in healthcare IT and security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Continuous Monitoring for CGRC.
Selection and Approval of Security and Privacy Controls...
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Exam Review Tips and Tricks for CGRC
Most relevant
Authorization/Approval of Information System for CGRC
Most relevant
Cloud Computing Fundamentals: Governance, Risk,...
Most relevant
Scope of the Information System for CGRC
Most relevant
Governance, Risk, and Compliance for CompTIA Security+
Most relevant
Assessment/Audit of Security and Privacy Controls for CGRC
Most relevant
Implementation of Security and Privacy Controls for CGRC
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser