Effective implementation of governance, risk, and compliance (GRC) programs requires specific cybersecurity talent and leadership. GRC professionals must utilize frameworks and best practices to integrate security and privacy within organizational objectives, better enabling stakeholders to make informed decisions regarding data security, compliance, supply chain risk management, and more.
抓住节省的机会!购买 Coursera Plus 3 个月课程可享受40% 的折扣,并可完全访问数千门课程。

推荐体验
推荐体验
初级
No prerequisite knowledge is required, but some experience or familiarity with cybersecurity and GRC concepts is recommended.
推荐体验
推荐体验
初级
No prerequisite knowledge is required, but some experience or familiarity with cybersecurity and GRC concepts is recommended.
您将获得的技能
- Data Security
- Risk Analysis
- Compliance Management
- Information Privacy
- Governance Risk Management and Compliance
- Security Controls
- Risk Management
- Information Systems Security
- Asset Protection
- Enterprise Risk Management (ERM)
- Compliance Auditing
- Verification And Validation
- Auditing
- Document Management
- Scope Management
- Continuous Monitoring
- Regulatory Compliance
- Business Risk Management
要了解的详细信息

添加到您的领英档案
February 2026
8 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有10个模块
涵盖的内容
1个视频
1个视频• 总计2分钟
- Course Introduction• 2分钟
Governance, risk, and compliance (GRC) encompasses the structured approach organizations follow to align IT and business strategies, manage risks effectively, and ensure organizational activities adhere to established regulations and standards.
涵盖的内容
7个视频1个作业
7个视频• 总计25分钟
- What GRC Really Does• 1分钟
- GRC Definitions• 4分钟
- GRC Over the System’s Life• 2分钟
- GRC Frameworks• 6分钟
- Frameworks in Action: The Hybrid Approach• 3分钟
- Who Does What in GRC• 4分钟
- Know Your Rules: A Global Regulatory Snapshot• 4分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
Scoping the system defines the boundaries and characteristics of the system that will be assessed and protected. It helps in identifying the system's assets, functions, interconnections, dependencies, area of operations, users, and stakeholders, as well as the applicable laws, regulations, policies, and standards that govern the system. Scoping of the system also helps to determine the level of risk that the system poses to the organization and its mission, and the level of effort and resources that will be required to manage the risk.
涵盖的内容
8个视频1个作业
8个视频• 总计18分钟
- Scope of the System• 1分钟
- System Scoping Process• 4分钟
- System Description Elements• 2分钟
- System Purpose and Functionality• 2分钟
- Security Compliance Requirements• 1分钟
- The Scoping Challenge of Compliance Frameworks and Regulations• 3分钟
- The Core Factors of Impact• 3分钟
- Redefining Scope Example• 2分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
The selection and approval of controls requires an understanding of what a control is, what it is designed to do, and what policy decisions shape the controls environment. Controls decisions are shaped by a variety of influences, including statutory or regulatory obligations, organizational security or privacy policies, the organization’s risk management practices, existing controls, system capabilities, and contractual requirements associated with the operation of the system.
涵盖的内容
9个视频1个作业
9个视频• 总计23分钟
- The Forces Shaping Your Security Controls• 3分钟
- Understanding Control Baselines• 2分钟
- The Architecture of Defense: Types and Categories of Controls• 7分钟
- Leveraging Common Controls for Efficiency• 2分钟
- Knowing When to Dig Deeper on Privacy• 2分钟
- Why Detail Matters When Identifying Important Data• 2分钟
- Availability: The System Owner’s Accountability• 2分钟
- The Shared Responsibility Model• 2分钟
- Documenting Your Security Story in the System Security Plan• 1分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
Security and privacy controls are the technical, administrative, and physical measures that an organization implements to protect its information systems and data from unauthorized access, use, disclosure, modification, or destruction. Control implementation and alignment helps an organization ensure the confidentiality, integrity, and availability of their information systems and data; reduce its exposure to threats and vulnerabilities; and demonstrate its adherence to relevant laws, regulations, and standards. It also enables the organization to communicate its security and privacy posture to its stakeholders, customers, and partners, and to build trust and reputation.
涵盖的内容
9个视频1个作业
9个视频• 总计25分钟
- Implementation of Security and Privacy Controls• 2分钟
- Bringing Controls to Life: The Six Steps of Implementation• 4分钟
- The Three Ways We Classify Controls• 4分钟
- Compensating Controls: Why They're Needed (and When to Use Them)• 3分钟
- Configuration Management: Keeping Things in Line• 4分钟
- Documentation: Why We Write Everything Down• 2分钟
- Dealing with Leftover Risk: The Residual Challenge• 2分钟
- Keeping the Ship Steady: Reviews, Training, and Readiness• 3分钟
- The Case of the Inconsistent Controls• 2分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
The term assessment generally implies a less formal assessment activity, while the term audit implies a more formal assessment typically done to show compliance to a particular standard. Across industries, the utilization of these terms can be inconsistent. The GRC professional should understand how the terms are employed within the context of a specific use case. Here "assessment" is used as a broad term that encompasses both general evaluations and the specific instances of audits.
涵盖的内容
9个视频1个作业
9个视频• 总计22分钟
- Assessment vs. Audit: Knowing the Difference• 2分钟
- Getting Ready for the Assessment: The Plan • 2分钟
- Scenario: The Tale of the Missing Sign-Off• 2分钟
- Assessment Activities: How We Check the Controls• 2分钟
- Proving Your Controls Actually Work• 3分钟
- The Initial Report: What Did We Find?• 2分钟
- Budget Battles: The Auditor as the Peacemaker• 3分钟
- The POA&M: Your Security To-Do List• 3分钟
- Delaying the Fix: Documenting a Phased Mitigation• 3分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
System compliance is the adherence of a system to the established standards, policies, and regulations that govern its operation, security, and performance. Documentation from security and privacy assessments after control implementation is reviewed to determine system compliance. These documents are analyzed against organizational risk strategy and risk assessments to determine residual risk compared to risk appetite. Once system compliance decisions are made and stakeholders acknowledge and agree on the risk treatment options, the system is authorized to operate and ready for production.
涵盖的内容
9个视频1个作业
9个视频• 总计20分钟
- System Compliance: The Final Go/No-Go Decision• 2分钟
- Adherence to Standards, Policies, and Regulations• 1分钟
- The Compliance Documentation Package: Your Proof of Security• 2分钟
- The Case of the Forgotten Keys• 3分钟
- Risk Treatment• 2分钟
- Accepting the Manageable Risk• 3分钟
- Stakeholder Concurrence• 2分钟
- The Authorizing Official• 2分钟
- Announcing the Final Decision• 3分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
System compliance is not a one-time event. Compliance maintenance includes processes that ensure a system remains compliant throughout its life cycle and detects and resolves any compliance issues that may arise. It extends beyond periodic demonstration of compliance and involves a comprehensive approach to change management, ongoing activities, and system decommissioning with strict adherence to global and industry-specific frameworks.
涵盖的内容
8个视频1个作业
8个视频• 总计20分钟
- Keeping It Secure: Your Strategy for Continued Compliance• 3分钟
- Keeping the Status Quo: Compliance Maintenance• 2分钟
- Managing Change in the Security Evolution• 3分钟
- Monitoring Changes: Staying on Track• 2分钟
- Monitoring Strategies: Keeping an Eye on Everything• 2分钟
- Ongoing Authorization• 3分钟
- Adapting to the New Rules• 3分钟
- All Systems Must Go• 2分钟
1个作业• 总计6分钟
- End of Section Quiz• 6分钟
ISC2 is the world’s leading member organization for cybersecurity professionals, driven by our vision of a safe and secure cyber world. Our certified members and associates are a force for good, safeguarding the way we live. Our certifications enable professionals to demonstrate their knowledge, skills, and abilities at every stage of their careers. Becoming a certified professional through the CGRC demonstrates to employers and peers that you have the knowledge and skills to integrate governance, risk management, and regulatory compliance within an organization. It shows that you are able to use various international frameworks to manage risk and authorize and maintain information systems. Official trainings, seminars, courseware, and self-study aids from ISC2 are available to help you get ready for the rigorous CGRC exam by reviewing relevant domains and topics. Whether you prefer self-paced, online instructor-led, or in-person classroom training, ISC2 has an option to fit your schedule and learning style.
涵盖的内容
1个视频
1个视频• 总计1分钟
- Course Conclusion• 1分钟
涵盖的内容
1篇阅读材料1个作业
1篇阅读材料• 总计5分钟
- Foundations of Governance, Risk, and Compliance (progression to CGRC)• 5分钟
1个作业• 总计40分钟
- Foundations of Governance, Risk, and Compliance Final Assessment• 40分钟
位教师

提供方

提供方

ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, ISC2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org
从 Security 浏览更多内容
状态:免费试用免费试用LLearnKartS
课程
状态:免费试用免费试用
状态:免费试用免费试用课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,


