Home Search Profile

GRC Analyst Pro: 2024 Cybersecurity Governance Masterclass

Focused View

9:40:58

  • 01-0.1-Welcome-to-the-Course-and-Expectations-(4-01-).html
  • 01-0.1-Welcome-to-the-Course-and-Expectations-(4-01-).mp4
    04:01
  • 02-0.2-Suggested-Student-Schedule.html
  • 03-0.3-About-Your-Instructor-(1-01-).html
  • 03-0.3-About-Your-Instructor-(1-01-).mp4
    01:01
  • 04-0.4-Prerequisites-and-Course-Resources-(4-29-).html
  • 04-0.4-Prerequisites-and-Course-Resources-(4-29-).mp4
    04:29
  • 01-1.1-Introduction-(2-39-).html
  • 01-1.1-Introduction-(2-39-).mp4
    02:39
  • 02-1.2-Cybersecurity-Primer-Baseline-Assessment.html
  • 03-1.3-What-is-Cybersecurity--(14-10-).html
  • 03-1.3-What-is-Cybersecurity--(14-10-).mp4
    14:10
  • 04-1.4-What-does-a-GRC-Analyst-do--(8-29-).html
  • 04-1.4-What-does-a-GRC-Analyst-do--(8-29-).mp4
    08:29
  • 05-1.5-Where-does-a-GRC-Analyst-Fit-in-the-Cybersecurity-Picture--(6-28-).html
  • 05-1.5-Where-does-a-GRC-Analyst-Fit-in-the-Cybersecurity-Picture--(6-28-).mp4
    06:28
  • 06-1.6-Understanding-Technology-(11-44-).html
  • 06-1.6-Understanding-Technology-(11-44-).mp4
    11:44
  • 07-1.7-Understanding-Threats-(9-09-).html
  • 07-1.7-Understanding-Threats-(9-09-).mp4
    09:09
  • 08-1.8-Quiz---Cybersecurity-Primer.html
  • 09-1.9-Conclusion-and-Touchpoints-(2-09-).html
  • 09-1.9-Conclusion-and-Touchpoints-(2-09-).mp4
    02:09
  • 01-2.1-Introduction-(3-49-).html
  • 01-2.1-Introduction-(3-49-).mp4
    03:49
  • 02-2.2-Compliance-and-Audit-Baseline-Assessment.html
  • 03-2.3-Cybersecurity-Frameworks-(24-41-).html
  • 03-2.3-Cybersecurity-Frameworks-(24-41-).mp4
    24:41
  • 04-2.4-Regulations-and-Compliance-Standards-(8-13-).html
  • 04-2.4-Regulations-and-Compliance-Standards-(8-13-).mp4
    08:13
  • 05-2.4b-SOC2-(Guest-Lecturer)-(15-07-).html
  • 05-2.4b-SOC2-(Guest-Lecturer)-(15-07-).mp4
    15:07
  • 06-2.4c-NIST-Risk-Management-Framework-(RMF)-[Bonus-Material]-(72-52-).html
  • 06-2.4c-NIST-Risk-Management-Framework-(RMF)-[Bonus-Material]-(72-52-).mp4
    01:12:52
  • 07-2.5-Practical-Auditing-(Practical-Lab)-(28-39-).html
  • 07-2.5-Practical-Auditing-(Practical-Lab)-(28-39-).mp4
    28:39
  • 08-2.5b-Practical-Auditing-(Part-2)-(45-10-).html
  • 08-2.5b-Practical-Auditing-(Part-2)-(45-10-).mp4
    45:10
  • 09-2.6-Quiz---Compliance-and-Audit.html
  • 10-2.7-Conclusion-and-Touchpoints-(5-22-).html
  • 10-2.7-Conclusion-and-Touchpoints-(5-22-).mp4
    05:22
  • 11-2.8-Resume-Bullet-Unlocked.html
  • 01-3.1-Introduction-(3-25-).html
  • 01-3.1-Introduction-(3-25-).mp4
    03:25
  • 02-3.2-Security-Awareness-Baseline-Assessment.html
  • 03-3.3-Know-Your-Audience-(10-55-).html
  • 03-3.3-Know-Your-Audience-(10-55-).mp4
    10:55
  • 04-3.4-Tools-of-the-Trade.html
  • 05-3.5-Lets-Raise-Awareness-(Practical-Lab)-(18-37-).html
  • 05-3.5-Lets-Raise-Awareness-(Practical-Lab)-(18-37-).mp4
    18:37
  • 06-3.6-Quiz---Security-Awareness.html
  • 07-3.7-Conclusion-and-Touchpoints-(1-26-).html
  • 07-3.7-Conclusion-and-Touchpoints-(1-26-).mp4
    01:26
  • 08-3.8-Resume-Bullet-Unlocked.html
  • 01-4.1-Introduction-(5-53-).html
  • 01-4.1-Introduction-(5-53-).mp4
    05:53
  • 02-4.2-Cybersecurity-Risk-Assessment-Baseline-Assessment.html
  • 03-4.3-What-is-Cybersecurity-Risk--(1-of-4)-(14-31-).html
  • 03-4.3-What-is-Cybersecurity-Risk--(1-of-4)-(14-31-).mp4
    14:31
  • 04-4.4-What-is-Cybersecurity-Risk-(2-of-4)-(10-48-).html
  • 04-4.4-What-is-Cybersecurity-Risk-(2-of-4)-(10-48-).mp4
    10:48
  • 05-4.5-What-is-Cybersecurity-Risk-(3-of-4)-(18-35-).html
  • 05-4.5-What-is-Cybersecurity-Risk-(3-of-4)-(18-35-).mp4
    18:35
  • 06-4.6-What-is-Cybersecurity-Risk-(4-of-4)-(8-39-).html
  • 06-4.6-What-is-Cybersecurity-Risk-(4-of-4)-(8-39-).mp4
    08:39
  • 07-4.7-What-is-Threat-Modeling--(18-19-).html
  • 07-4.7-What-is-Threat-Modeling--(18-19-).mp4
    18:19
  • 08-4.8-Lets-Assess-Risk!-(Practical-Lab)-(19-54-).html
  • 08-4.8-Lets-Assess-Risk!-(Practical-Lab)-(19-54-).mp4
    19:54
  • 09-4.8b-Lets-Assess-Risk!-(Practical-Lab)-(Part-2)-(20-50-).html
  • 09-4.8b-Lets-Assess-Risk!-(Practical-Lab)-(Part-2)-(20-50-).mp4
    20:50
  • 10-4.9-Quiz---Cybersecurity-Risk.html
  • 11-4.10-Conclusion-and-Touchpoints-(3-08-).html
  • 11-4.10-Conclusion-and-Touchpoints-(3-08-).mp4
    03:08
  • 12-4.11-Resume-Bullet-Unlocked.html
  • 01-5.1-Introduction-(3-10-).html
  • 01-5.1-Introduction-(3-10-).mp4
    03:10
  • 02-5.2-Governance-Baseline-Assessment.html
  • 03-5.3-Policies-(12-38-).html
  • 03-5.3-Policies-(12-38-).mp4
    12:38
  • 04-5.4-Standards-(4-49-).html
  • 04-5.4-Standards-(4-49-).mp4
    04:49
  • 05-5.5-Procedures-(7-11-).html
  • 05-5.5-Procedures-(7-11-).mp4
    07:11
  • 06-5.6-Lets-Research-and-Write-an-Effective-Policy-(Practical-Lab)-(73-35-).html
  • 06-5.6-Lets-Research-and-Write-an-Effective-Policy-(Practical-Lab)-(73-35-).mp4
    01:13:35
  • 07-5.7-Quiz---Governance.html
  • 08-5.8-Conclusion-and-Touchpoints-(2-48-).html
  • 08-5.8-Conclusion-and-Touchpoints-(2-48-).mp4
    02:48
  • 09-5.9-Resume-Bullet-Unlocked.html
  • 01-6.1-Introduction-(1-21-).html
  • 01-6.1-Introduction-(1-21-).mp4
    01:21
  • 02-6.2-Getting-a-GRC-Analyst-Job-Baseline-Assessment.html
  • 03-6.3-Finding-a-Job-(15-36-).html
  • 03-6.3-Finding-a-Job-(15-36-).mp4
    15:36
  • 04-6.4-Setup-and-Tune-LinkedIn-(12-38-).html
  • 04-6.4-Setup-and-Tune-LinkedIn-(12-38-).mp4
    12:38
  • 05-6.5-Resume-(4-04-).html
  • 05-6.5-Resume-(4-04-).mp4
    04:04
  • 06-6.6-Interviewing-(16-49-).html
  • 06-6.6-Interviewing-(16-49-).mp4
    16:49
  • 07-6.7-Quiz---Getting-a-GRC-Analyst-Job.html
  • 08-6.8-Conclusion-and-Touchpoints-(1-33-).html
  • 08-6.8-Conclusion-and-Touchpoints-(1-33-).mp4
    01:33
    • 05-6.5-Resume-(4-04-)
    • SimplyCyber Example 1 - Short.docx
    • SimplyCyber Example 2 - Long.docx
    • SimplyCyber Example 3 - Home Lab (Junior.docx
  • 01-7.1-Final-Thoughts-(1-34-).html
  • 01-7.1-Final-Thoughts-(1-34-).mp4
    01:34
  • 02-7.2-Leave-Feedback-.html
  • More details


    Course Overview

    This definitive masterclass provides complete training for aspiring GRC analysts, covering cybersecurity governance, risk management, compliance frameworks, and job-ready skills through practical labs.

    What You'll Learn

    • Implement NIST, SOC2 and other compliance frameworks
    • Conduct risk assessments and security audits
    • Develop enterprise security policies and procedures

    Who This Is For

    • Aspiring GRC analysts
    • IT professionals transitioning to cybersecurity
    • Compliance officers upgrading skills

    Key Benefits

    • Hands-on labs with real-world GRC scenarios
    • Career-focused training with resume guidance
    • Comprehensive coverage of governance frameworks

    Curriculum Highlights

    1. Cybersecurity Foundations & GRC Role
    2. Compliance Audits & Risk Assessment
    3. Security Governance & Policy Development
    Focused display
    • language english
    • Training sessions 44
    • duration 9:40:58
    • Release Date 2025/04/19