Security and privacy must be built into Information Systems. This course will teach you the process of implementing information security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Security and privacy must be built into Information Systems. This course will teach you the process of implementing information security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
Many IT projects start with good intentions and a good security design but then the end product does not meet those design requirements. In this course, Implementation of Security and Privacy Controls for CGRC, you’ll learn to implement information and privacy controls into an information system according to the system security plan. First, you’ll explore control configuration. Next, you’ll determine compensating and inherited controls. Finally, you’ll learn how to verify and document the controls. When you’re finished with this course, you’ll have the skills and knowledge of Implementation of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.