GRC Analyst Pro: 2024 Cybersecurity Governance Masterclass
Focused View
9:40:58
01-0.1-Welcome-to-the-Course-and-Expectations-(4-01-).html
01-0.1-Welcome-to-the-Course-and-Expectations-(4-01-).mp4
04:01
02-0.2-Suggested-Student-Schedule.html
03-0.3-About-Your-Instructor-(1-01-).html
03-0.3-About-Your-Instructor-(1-01-).mp4
01:01
04-0.4-Prerequisites-and-Course-Resources-(4-29-).html
04-0.4-Prerequisites-and-Course-Resources-(4-29-).mp4
04:29
01-1.1-Introduction-(2-39-).html
01-1.1-Introduction-(2-39-).mp4
02:39
02-1.2-Cybersecurity-Primer-Baseline-Assessment.html
03-1.3-What-is-Cybersecurity--(14-10-).html
03-1.3-What-is-Cybersecurity--(14-10-).mp4
14:10
04-1.4-What-does-a-GRC-Analyst-do--(8-29-).html
04-1.4-What-does-a-GRC-Analyst-do--(8-29-).mp4
08:29
05-1.5-Where-does-a-GRC-Analyst-Fit-in-the-Cybersecurity-Picture--(6-28-).html
05-1.5-Where-does-a-GRC-Analyst-Fit-in-the-Cybersecurity-Picture--(6-28-).mp4
06:28
06-1.6-Understanding-Technology-(11-44-).html
06-1.6-Understanding-Technology-(11-44-).mp4
11:44
07-1.7-Understanding-Threats-(9-09-).html
07-1.7-Understanding-Threats-(9-09-).mp4
09:09
08-1.8-Quiz---Cybersecurity-Primer.html
09-1.9-Conclusion-and-Touchpoints-(2-09-).html
09-1.9-Conclusion-and-Touchpoints-(2-09-).mp4
02:09
01-2.1-Introduction-(3-49-).html
01-2.1-Introduction-(3-49-).mp4
03:49
02-2.2-Compliance-and-Audit-Baseline-Assessment.html
03-2.3-Cybersecurity-Frameworks-(24-41-).html
03-2.3-Cybersecurity-Frameworks-(24-41-).mp4
24:41
04-2.4-Regulations-and-Compliance-Standards-(8-13-).html
04-2.4-Regulations-and-Compliance-Standards-(8-13-).mp4
08:13
05-2.4b-SOC2-(Guest-Lecturer)-(15-07-).html
05-2.4b-SOC2-(Guest-Lecturer)-(15-07-).mp4
15:07
06-2.4c-NIST-Risk-Management-Framework-(RMF)-[Bonus-Material]-(72-52-).html
06-2.4c-NIST-Risk-Management-Framework-(RMF)-[Bonus-Material]-(72-52-).mp4
01:12:52
07-2.5-Practical-Auditing-(Practical-Lab)-(28-39-).html
07-2.5-Practical-Auditing-(Practical-Lab)-(28-39-).mp4
28:39
08-2.5b-Practical-Auditing-(Part-2)-(45-10-).html
08-2.5b-Practical-Auditing-(Part-2)-(45-10-).mp4
45:10
09-2.6-Quiz---Compliance-and-Audit.html
10-2.7-Conclusion-and-Touchpoints-(5-22-).html
10-2.7-Conclusion-and-Touchpoints-(5-22-).mp4
05:22
11-2.8-Resume-Bullet-Unlocked.html
01-3.1-Introduction-(3-25-).html
01-3.1-Introduction-(3-25-).mp4
03:25
02-3.2-Security-Awareness-Baseline-Assessment.html
03-3.3-Know-Your-Audience-(10-55-).html
03-3.3-Know-Your-Audience-(10-55-).mp4
10:55
04-3.4-Tools-of-the-Trade.html
05-3.5-Lets-Raise-Awareness-(Practical-Lab)-(18-37-).html
05-3.5-Lets-Raise-Awareness-(Practical-Lab)-(18-37-).mp4
18:37
06-3.6-Quiz---Security-Awareness.html
07-3.7-Conclusion-and-Touchpoints-(1-26-).html
07-3.7-Conclusion-and-Touchpoints-(1-26-).mp4
01:26
08-3.8-Resume-Bullet-Unlocked.html
01-4.1-Introduction-(5-53-).html
01-4.1-Introduction-(5-53-).mp4
05:53
02-4.2-Cybersecurity-Risk-Assessment-Baseline-Assessment.html
03-4.3-What-is-Cybersecurity-Risk--(1-of-4)-(14-31-).html
03-4.3-What-is-Cybersecurity-Risk--(1-of-4)-(14-31-).mp4
14:31
04-4.4-What-is-Cybersecurity-Risk-(2-of-4)-(10-48-).html
04-4.4-What-is-Cybersecurity-Risk-(2-of-4)-(10-48-).mp4
10:48
05-4.5-What-is-Cybersecurity-Risk-(3-of-4)-(18-35-).html
05-4.5-What-is-Cybersecurity-Risk-(3-of-4)-(18-35-).mp4
18:35
06-4.6-What-is-Cybersecurity-Risk-(4-of-4)-(8-39-).html
06-4.6-What-is-Cybersecurity-Risk-(4-of-4)-(8-39-).mp4
08:39
07-4.7-What-is-Threat-Modeling--(18-19-).html
07-4.7-What-is-Threat-Modeling--(18-19-).mp4
18:19
08-4.8-Lets-Assess-Risk!-(Practical-Lab)-(19-54-).html
08-4.8-Lets-Assess-Risk!-(Practical-Lab)-(19-54-).mp4
19:54
09-4.8b-Lets-Assess-Risk!-(Practical-Lab)-(Part-2)-(20-50-).html
09-4.8b-Lets-Assess-Risk!-(Practical-Lab)-(Part-2)-(20-50-).mp4
20:50
10-4.9-Quiz---Cybersecurity-Risk.html
11-4.10-Conclusion-and-Touchpoints-(3-08-).html
11-4.10-Conclusion-and-Touchpoints-(3-08-).mp4
03:08
12-4.11-Resume-Bullet-Unlocked.html
01-5.1-Introduction-(3-10-).html
01-5.1-Introduction-(3-10-).mp4
03:10
02-5.2-Governance-Baseline-Assessment.html
03-5.3-Policies-(12-38-).html
03-5.3-Policies-(12-38-).mp4
12:38
04-5.4-Standards-(4-49-).html
04-5.4-Standards-(4-49-).mp4
04:49
05-5.5-Procedures-(7-11-).html
05-5.5-Procedures-(7-11-).mp4
07:11
06-5.6-Lets-Research-and-Write-an-Effective-Policy-(Practical-Lab)-(73-35-).html
06-5.6-Lets-Research-and-Write-an-Effective-Policy-(Practical-Lab)-(73-35-).mp4
01:13:35
07-5.7-Quiz---Governance.html
08-5.8-Conclusion-and-Touchpoints-(2-48-).html
08-5.8-Conclusion-and-Touchpoints-(2-48-).mp4
02:48
09-5.9-Resume-Bullet-Unlocked.html
01-6.1-Introduction-(1-21-).html
01-6.1-Introduction-(1-21-).mp4
01:21
02-6.2-Getting-a-GRC-Analyst-Job-Baseline-Assessment.html
03-6.3-Finding-a-Job-(15-36-).html
03-6.3-Finding-a-Job-(15-36-).mp4
15:36
04-6.4-Setup-and-Tune-LinkedIn-(12-38-).html
04-6.4-Setup-and-Tune-LinkedIn-(12-38-).mp4
12:38
05-6.5-Resume-(4-04-).html
05-6.5-Resume-(4-04-).mp4
04:04
06-6.6-Interviewing-(16-49-).html
06-6.6-Interviewing-(16-49-).mp4
16:49
07-6.7-Quiz---Getting-a-GRC-Analyst-Job.html
08-6.8-Conclusion-and-Touchpoints-(1-33-).html
08-6.8-Conclusion-and-Touchpoints-(1-33-).mp4
01:33
- 05-6.5-Resume-(4-04-)
- SimplyCyber Example 1 - Short.docx
- SimplyCyber Example 2 - Long.docx
- SimplyCyber Example 3 - Home Lab (Junior.docx
01-7.1-Final-Thoughts-(1-34-).html
01-7.1-Final-Thoughts-(1-34-).mp4
01:34
02-7.2-Leave-Feedback-.html
More details
Course Overview
This definitive masterclass provides complete training for aspiring GRC analysts, covering cybersecurity governance, risk management, compliance frameworks, and job-ready skills through practical labs.
What You'll Learn
- Implement NIST, SOC2 and other compliance frameworks
- Conduct risk assessments and security audits
- Develop enterprise security policies and procedures
Who This Is For
- Aspiring GRC analysts
- IT professionals transitioning to cybersecurity
- Compliance officers upgrading skills
Key Benefits
- Hands-on labs with real-world GRC scenarios
- Career-focused training with resume guidance
- Comprehensive coverage of governance frameworks
Curriculum Highlights
- Cybersecurity Foundations & GRC Role
- Compliance Audits & Risk Assessment
- Security Governance & Policy Development
Focused display
Category
- language english
- Training sessions 44
- duration 9:40:58
- Release Date 2025/04/19