We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Implementation of Security and Privacy Controls for CGRC

Kevin Henry

Security and privacy must be built into Information Systems. This course will teach you the process of implementing information security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.

Read more

Security and privacy must be built into Information Systems. This course will teach you the process of implementing information security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.

Many IT projects start with good intentions and a good security design but then the end product does not meet those design requirements. In this course, Implementation of Security and Privacy Controls for CGRC, you’ll learn to implement information and privacy controls into an information system according to the system security plan. First, you’ll explore control configuration. Next, you’ll determine compensating and inherited controls. Finally, you’ll learn how to verify and document the controls. When you’re finished with this course, you’ll have the skills and knowledge of Implementation of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.

Enroll now

What's inside

Syllabus

Course Overview
Implement Controls
Document Controls
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Kevin Henry, who has domain expertise as a Senior Instructional Designer in GRC
Examines a set of complex topics including control configuration, compensating controls, inherited controls, control verification, and control documentation for security and privacy
Helps students meet objectives required for the Certified in Governance, Risk and Compliance examination

Save this course

Save Implementation of Security and Privacy Controls for CGRC to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Implementation of Security and Privacy Controls for CGRC. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Implementation of Security and Privacy Controls for CGRC will develop knowledge and skills that may be useful to these careers:
IT Auditor
An IT Auditor is responsible for assessing the effectiveness of an organization's information systems controls. This course helps build a foundation for this role by teaching you the process of implementing information security and privacy controls. You'll learn how to configure controls, determine compensating and inherited controls, and verify and document controls. This knowledge is essential for anyone who wants to work in the field of IT auditing.
Information Security Analyst
An Information Security Analyst is responsible for assessing and mitigating risks to an organization's information systems. This course helps build a foundation for this role by teaching you the process of implementing information security and privacy controls. You'll learn how to configure controls, determine compensating and inherited controls, and verify and document controls. This knowledge is essential for anyone who wants to work in the field of information security.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization. This course helps build a foundation for this role by teaching you the process of implementing information security and privacy controls. You'll learn how to configure controls, determine compensating and inherited controls, and verify and document controls. This knowledge is essential for anyone who wants to work in the field of risk management.
Compliance Manager
A Compliance Manager is responsible for ensuring that an organization complies with all applicable laws and regulations. This course helps build a foundation for this role by teaching you the process of implementing information security and privacy controls. You'll learn how to configure controls, determine compensating and inherited controls, and verify and document controls. This knowledge is essential for anyone who wants to work in the field of compliance.
Security Architect
A Security Architect is responsible for designing and implementing an organization's information security architecture. This course helps build a foundation for this role by teaching you the process of implementing information security and privacy controls. You'll learn how to configure controls, determine compensating and inherited controls, and verify and document controls. This knowledge is essential for anyone who wants to work in the field of information security architecture.
Information Systems Security Manager
An Information Systems Security Manager is responsible for planning, implementing, and managing an organization's information security program. This course helps build a foundation for this role by teaching you the process of implementing information security and privacy controls. You'll learn how to configure controls, determine compensating and inherited controls, and verify and document controls. This knowledge is essential for anyone who wants to lead an organization's efforts to protect its information assets from threats.
Data Protection Officer
A Data Protection Officer is responsible for ensuring that an organization complies with all applicable data protection laws and regulations. This course helps build a foundation for this role by teaching you the importance of information security and privacy controls. You'll learn how to implement security measures to protect sensitive information from unauthorized access, use, or disclosure.
Cybersecurity Engineer
A Cybersecurity Engineer is responsible for defending an organization's information systems from cyberattacks. This course helps build a foundation for this role by teaching you the importance of information security and privacy controls. You'll learn how to implement security measures to protect networks, systems, and data from cyberattacks.
Information Security Consultant
An Information Security Consultant provides advice and guidance to organizations on how to protect their information assets from threats. This course helps build a foundation for this role by teaching you the importance of information security and privacy controls. You'll learn how to implement security measures to protect information from unauthorized access, use, or disclosure.
Information Security Engineer
An Information Security Engineer is responsible for designing, implementing, and maintaining an organization's information security systems. This course helps build a foundation for this role by teaching you the importance of information security and privacy controls. You'll learn how to implement security measures to protect information from unauthorized access, use, or disclosure.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security systems. This course helps build a foundation for this role by teaching you the importance of information security and privacy controls. You'll learn how to implement security measures to protect network devices and data from unauthorized access, use, or disclosure.
Privacy Officer
A Privacy Officer is responsible for protecting an organization's sensitive personal information. This course helps build a foundation for this role by teaching you the importance of information security and privacy controls. You'll learn how to implement security measures to protect sensitive information from unauthorized access, use, or disclosure.
Cloud Security Engineer
A Cloud Security Engineer is responsible for securing an organization's cloud computing environment. This course may be useful for this role by teaching you about the importance of implementing security controls in a cloud environment.
Security Analyst
A Security Analyst is responsible for monitoring and analyzing an organization's security systems to detect and respond to threats. This course may be useful for this role by teaching you about the importance of implementing security controls to protect an organization's information assets.
DevSecOps Engineer
A DevSecOps Engineer is responsible for integrating security into an organization's software development lifecycle. This course may be useful for this role by teaching you about the importance of implementing security controls in a software development environment.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Implementation of Security and Privacy Controls for CGRC.
Provides a practical guide to implementing information security controls and valuable resource for those who are responsible for the security of information systems.
Provides a comprehensive overview of the NIST Cybersecurity Framework. It covers topics such as cybersecurity risk management, cybersecurity controls, and cybersecurity incident response.
Provides a comprehensive overview of information security risk management and valuable reference for those who are responsible for the security of information systems.
Provides a comprehensive overview of the GDPR. It covers topics such as data protection, privacy rights, and enforcement.
Provides a comprehensive overview of security engineering and valuable reference for those who are interested in learning more about the topic.
Provides a comprehensive overview of network security and valuable reference for those who are interested in learning more about the topic.
Provides a comprehensive overview of firewalls and intrusion detection systems and valuable reference for those who are interested in learning more about the topic.
Provides a comprehensive overview of secure coding and valuable reference for those who are interested in learning more about the topic.
Provides a comprehensive overview of computer security and valuable reference for those who are interested in learning more about the topic.
Provides a comprehensive overview of cryptography and network security and valuable reference for those who are interested in learning more about the topic.
Provides a comprehensive overview of the NIS Directive. It covers topics such as cybersecurity risk management, cybersecurity controls, and cybersecurity incident response.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Implementation of Security and Privacy Controls for CGRC.
Selection and Approval of Security and Privacy Controls...
Most relevant
Assessment/Audit of Security and Privacy Controls for CGRC
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Continuous Monitoring for CGRC
Most relevant
Authorization/Approval of Information System for CGRC
Most relevant
Governance, Risk, and Compliance for CompTIA Security+
Most relevant
Scope of the Information System for CGRC
Most relevant
Information Governance: HIPAA
Most relevant
Information Technology and Security ISACA® CRISC™
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser