We may earn an affiliate commission when you visit our partners.
Kevin Henry

Risk is managed through controls and this course will teach you how to select the controls required to protect an Information System as needed for the Certified in Governance, Risk and Compliance examination.

Read more

Risk is managed through controls and this course will teach you how to select the controls required to protect an Information System as needed for the Certified in Governance, Risk and Compliance examination.

The objective of risk management is to ensure that adequate controls are in place to protect information and information systems. In this course, Selection and Approval of Security and Privacy Controls for the Certified in Governance, Risk and Compliance certification, you’ll learn to select and document the security controls needed in an Information system and documented in the System Security Plan. First, you’ll explore control requirements. Next, you’ll discover allocation of baseline and inherited controls. Finally, you’ll learn how to prepare system documentation to obtain approval for the system security plan. When you’re finished with this course, you’ll have the skills and knowledge of selection and approval of security and privacy controls needed for the Certified in Governance, Risk and Compliance examination.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Select and Tailor Information Security Controls
Document and Approve Information Security Plans
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores control requirements, which is standard in the field of risk management
Taught by Kevin Henry, who is recognized for their work in governance, risk, and compliance
Develops skills and knowledge needed for the Certified in Governance, Risk and Compliance examination
Examines allocation of baseline and inherited controls, which is highly relevant to system security

Save this course

Save Selection and Approval of Security and Privacy Controls for CGRC to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Selection and Approval of Security and Privacy Controls for CGRC with these activities:
Review Course Materials
Review the course materials in advance to familiarize yourself with the key concepts and topics.
Show steps
  • Read through the syllabus and course outline
  • Review the assigned readings and videos
  • Take notes and highlight important points
Glossary of Security Terms
Create a glossary of key security terms to reinforce your understanding of the technical vocabulary used in the course.
Show steps
  • Identify the key security terms from the course materials
  • Define each term clearly and concisely
  • Organize the terms into a glossary
Review Information Systems Security
Review the key concepts of information systems security to strengthen your foundational knowledge for the course.
Show steps
  • Read Chapters 1-3
  • Summarize the main points of each chapter
  • Identify key terms and concepts
Five other activities
Expand to see all activities and additional details
Show all eight activities
Control Approval Process Walkthrough
Follow guided tutorials to enhance your understanding of the approval process for security controls.
Browse courses on Security Controls
Show steps
  • Find video tutorials or online resources
  • Watch the tutorials and take notes
  • Summarize the key steps in the approval process
Control Selection Practice
Engage in exercises that strengthen your ability to select appropriate security controls for various scenarios.
Show steps
  • Access practice questions or simulations
  • Apply the principles of control selection
  • Analyze scenarios and identify suitable controls
  • Review your answers and learn from mistakes
Security Control Allocation Exercises
Complete exercises that reinforce your ability to allocate security controls appropriately.
Show steps
  • Review the course materials on control allocation
  • Analyze scenarios and identify applicable controls
  • Apply the principles of control allocation
  • Check your answers and learn from mistakes
System Security Plan Outline
Create an outline for a system security plan to demonstrate your understanding of documenting security controls.
Browse courses on System Security Plan
Show steps
  • Review the course materials on system security plans
  • Gather information about a specific system
  • Identify the security controls for the system
  • Create an outline for the system security plan
System Security Plan Proposal
Craft a proposal for a system security plan to apply your knowledge in a practical setting.
Browse courses on System Security
Show steps
  • Research and gather information about a specific system
  • Identify the relevant security controls and requirements
  • Develop a plan for implementing and managing the security controls
  • Write a comprehensive proposal outlining the plan

Career center

Learners who complete Selection and Approval of Security and Privacy Controls for CGRC will develop knowledge and skills that may be useful to these careers:
Privacy Officer
Privacy Officers are responsible for developing and implementing privacy policies and procedures to protect personal information. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for understanding the legal and regulatory requirements for protecting personal information.
Data Privacy Analyst
Data Privacy Analysts help organizations to comply with privacy regulations, manage privacy risks, and protect sensitive data. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for developing the skills needed to select and implement security controls to protect personal information.
IT Security Architect
IT Security Architects design and implement security solutions for information systems. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning about the process of selecting and implementing security controls.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security systems to protect cloud applications and data. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning about the process of selecting and implementing security controls to protect cloud environments.
Security Architect
Security Architects design and implement security solutions for organizations. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning about the process of selecting and implementing security controls to protect organizations from security threats.
Information Security Engineer
Information Security Engineers design, implement, and maintain security systems to protect information and information systems. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning about the process of selecting and implementing security controls.
Security Consultant
Security Consultants help organizations to protect their information and information systems. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning how to assess the security needs of an organization and to recommend appropriate controls.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures to protect information and information systems. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful to learn about the process of selecting and approving security controls.
IT Auditor
IT Auditors evaluate the effectiveness of IT controls to ensure that they are operating as intended. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning about the process of selecting and implementing security controls, as well as how to evaluate their effectiveness.
Cybersecurity Analyst
Cybersecurity Analysts protect computer systems and networks from cyberattacks. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful by providing an understanding of the different types of security controls that can be used to protect against cybersecurity threats.
Network Security Engineer
Network Security Engineers design, implement, and maintain security systems to protect networks and network devices. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for learning about the process of selecting and implementing security controls to protect networks.
Security Analyst
Security Analysts monitor and analyze security events to identify and respond to threats. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for developing the skills needed to select and implement security controls to prevent and detect security breaches.
Risk Manager
Risk Managers are responsible for identifying and assessing risks to an organization. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for understanding how to select and implement controls to mitigate risks.
Compliance Analyst
Compliance Analysts may leverage their knowledge of security and privacy controls to assist their company in managing regulatory compliance. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful in learning how to identify and implement the security controls needed to protect information and systems.
Auditor
Auditors are responsible for assessing the effectiveness of internal controls. The course, Selection and Approval of Security and Privacy Controls for CGRC, may be useful for developing the skills to evaluate the adequacy of security and privacy controls.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Selection and Approval of Security and Privacy Controls for CGRC.
Provides a comprehensive overview of information security risk management, and it covers all of the key concepts and practices that are needed to manage security risks effectively.
Provides a practical guide to cloud security, and it covers all of the key concepts and practices that are needed to protect cloud-based applications and data.
Provides a comprehensive guide to security awareness, and it valuable resource for IT professionals of all levels.
Provides a practical guide to penetration testing, and it valuable resource for security professionals of all levels.
Provides a comprehensive guide to security engineering, and it valuable resource for security professionals of all levels.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Selection and Approval of Security and Privacy Controls for CGRC.
Implementation of Security and Privacy Controls for CGRC
Most relevant
Assessment/Audit of Security and Privacy Controls for CGRC
Most relevant
Authorization/Approval of Information System for CGRC
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Continuous Monitoring for CGRC
Most relevant
Scope of the Information System for CGRC
Most relevant
Governance, Risk, and Compliance for CompTIA Security+
Most relevant
Information and Cyber Security Literacy: Governance, Risk...
Most relevant
Information and Cyber Security Governance, Risk and...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser