محتوى الدورة
Module 1
0/7
Information Security and Cybersecurity
06:21
cybersecurity cube
32:40
Different cybersecurity concepts
09:38
Attacks, Attack Actors and Threat modeling
Basic Cryptographic Concepts
07:13
Security Principles
14:08
Exam Module 1
00:12:00
Module 2
0/3
What is GRC
18:23
GRC goals, where its used, and its place with AI
11:41
Exam Module 2
00:10:00
Module 3
0/5
What is governance
09:31
governance structure
14:57
ISO 38500 simple overview
19:48
COBIT simple overview
13:32
Exam Module 3
00:10:00
Module 4
0/7
What is Compliance
06:07
Compliance Layers
21:19
Different Concepts in Compliance
10:07
Compliance Life Cycle
16:30
Control Theory in Compliance
06:19
ISO 37301 Simple Overview
22:26
Exam Module 4
00:15:00
Module 5
0/6
What is a risk
07:01
Risk Types
08:12
Risk Terminology
06:29
Risk Treatment Approaches
05:59
Risk Communication and Reporting
07:30
Exam Module 5
00:12:00
Module 6
0/4
Understanding Risk Methodologies and its Steps
19:28
Selecting A Methodology, Different Techniques and Tools Used
11:40
Practical Example
19:23
Exam Module 6
00:15:00
Module 7
0/4
Understand risk treatment and control purpose and their types
13:21
Cost vs benefit, and ROI
07:46
Risk treatment Plan
21:54
Exam Module 7
00:15:00
Module 8
0/5
Understand Risk Registers
04:47
Risk Register steps and lifecycle
09:21
Diagrams Used in Risk Assessment
11:22
Risk Reporting
09:02
Exam Module 8
00:15:00
Module 9
0/6
Policy Architecture its purpose and the Hierarchy
10:07
Levels of Security Policy
18:11
Policy Architecture, Policy Life cycle and common types of policies
12:26
Risk Reporting
09:02
Comparing Two Policies Briefly Example
12:42
Exam Module 9
00:15:00
GRC
0%
مكتمل
وضع علامة مكتمل
Home
Services
About
Courses
Teachers
Community
Contact
Exams
CTF
Cys Tech
الصفحة الرئيسية
لغات البرمجة
امن سيبراني
الشبكات
انظمة التشغيل
مواد جامعية
My account
الصفحة الرئيسية
لغات البرمجة
امن سيبراني
الشبكات
انظمة التشغيل
مواد جامعية
My account
تسجيل الدخول