[ WebToolTip.com ] ISC2 Certified in Governance, Risk and Compliance (CGRC) Cert Prep
File List
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/07. CGRC government documentation.mp4 28.9 MB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/03. Implementation guides and other resources.mp4 27.1 MB
- ~Get Your Files Here !/03. 2. Scope of the System/03. Organization-level tasks P-4 to P-7.mp4 17.7 MB
- ~Get Your Files Here !/03. 2. Scope of the System/10. System-level tasks P-14 to P-17.mp4 16.7 MB
- ~Get Your Files Here !/10. 9. CGRC Layout and Testing/01. CGRC layout and testing, certification process, exam and study prep, and post-exam.mp4 15.3 MB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/06. NIST risk management framework.mp4 14.2 MB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/04. Authorization package updates and security and privacy reporting.mp4 14.0 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/04. Authorization decision types.mp4 13.4 MB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/02. Control implementation, responsibility, and compliance.mp4 13.1 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/01. Phase 2 Select – overview.mp4 12.5 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/03. Develop, review, and approve assessment plans.mp4 12.1 MB
- ~Get Your Files Here !/03. 2. Scope of the System/02. Organization-level tasks P-1 to P-3.mp4 12.0 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/03. Baseline selection approach vs organization-generated selection approach.mp4 11.0 MB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/05. Security authorization process.mp4 10.7 MB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/01. Security and privacy governance, risk management, and compliance program introduction.mp4 10.6 MB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/03. Risk.mp4 10.2 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/06. Control documentation and continuous monitoring.mp4 9.9 MB
- ~Get Your Files Here !/03. 2. Scope of the System/07. System-level tasks P-10 to P-11.mp4 9.9 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/04. Define and categorize a system.mp4 9.4 MB
- ~Get Your Files Here !/03. 2. Scope of the System/09. System-level tasks P-12 to P-13.mp4 9.1 MB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/02. Monitor and assess controls.mp4 9.1 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/05. SDLC phases to RMF steps mapping.mp4 8.7 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/04. Control tailoring.mp4 8.7 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/04. Control assessment.mp4 8.3 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/02. Select phase guiding documentation.mp4 8.1 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/02. Security categorization organization and guidance.mp4 7.6 MB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/02. Principles of information security.mp4 7.4 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/06. SAR and PAR report preparation.mp4 6.6 MB
- ~Get Your Files Here !/03. 2. Scope of the System/06. System-level tasks P-8 to P-9.mp4 6.4 MB
- ~Get Your Files Here !/03. 2. Scope of the System/08. Review the seven system-level data governance roles.mp4 6.3 MB
- ~Get Your Files Here !/03. 2. Scope of the System/05. System-level tasks.mp4 6.2 MB
- ~Get Your Files Here !/03. 2. Scope of the System/11. System-level task P-18.mp4 6.2 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/07. RMF to SDLC mapping.mp4 6.1 MB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/04. Risk response.mp4 5.7 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/07. Security and privacy plan approval process.mp4 5.7 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/08. POA&M preparation.mp4 5.5 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/03. Security categorization process.mp4 5.5 MB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/05. Ongoing authorization and system disposal.mp4 5.4 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/06. Security categorization review and approval.mp4 5.2 MB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/01. Phase 6 Monitor – overview.mp4 4.9 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/05. National security systems (NSS).mp4 4.8 MB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/03. Ongoing assessments and risk response.mp4 4.7 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/01. Phase 4 Assess – overview.mp4 4.6 MB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/01. Phase 3 Implement – overview.mp4 4.4 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/03. Risk analysis and risk response.mp4 4.2 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/01. Phase 5 Authorization – overview.mp4 4.0 MB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/06. Monitor review.mp4 3.8 MB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/04. Unofficial POA&M.mp4 3.8 MB
- ~Get Your Files Here !/03. 2. Scope of the System/01. Prepare phase overview.mp4 3.8 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/06. Authorization reporting.mp4 3.7 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/02. Assessor selection.mp4 3.7 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/02. Authorization package assembly.mp4 3.6 MB
- ~Get Your Files Here !/03. 2. Scope of the System/04. Organization-level tasks review.mp4 3.6 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/08. Select phase document review.mp4 3.5 MB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/05. Control allocation.mp4 2.9 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/07. Remediation options.mp4 2.7 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/05. Authorization decisions drills.mp4 2.2 MB
- ~Get Your Files Here !/03. 2. Scope of the System/12. Review prepare tasks at system level.mp4 2.1 MB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/05. Implementation phase review.mp4 2.0 MB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/07. Phase 5 Authorization review.mp4 1.7 MB
- ~Get Your Files Here !/04. 3. Categorization of a System/01. Phase 1 Categorize – overview.mp4 1.6 MB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/09. Assessment phase review.mp4 1.2 MB
- ~Get Your Files Here !/01. Certified Governance Risk Management and Compliance Overview/01. Course overview.mp4 965.1 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/07. CGRC government documentation.srt 17.5 KB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/03. Implementation guides and other resources.srt 16.2 KB
- ~Get Your Files Here !/10. 9. CGRC Layout and Testing/01. CGRC layout and testing, certification process, exam and study prep, and post-exam.srt 10.8 KB
- ~Get Your Files Here !/03. 2. Scope of the System/03. Organization-level tasks P-4 to P-7.srt 9.5 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/04. Authorization decision types.srt 8.6 KB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/04. Authorization package updates and security and privacy reporting.srt 8.4 KB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/02. Control implementation, responsibility, and compliance.srt 7.8 KB
- ~Get Your Files Here !/03. 2. Scope of the System/10. System-level tasks P-14 to P-17.srt 7.6 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/01. Phase 2 Select – overview.srt 7.5 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/03. Develop, review, and approve assessment plans.srt 7.4 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/03. Risk.srt 7.3 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/06. NIST risk management framework.srt 6.7 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/03. Baseline selection approach vs organization-generated selection approach.srt 6.6 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/05. Security authorization process.srt 6.4 KB
- ~Get Your Files Here !/03. 2. Scope of the System/07. System-level tasks P-10 to P-11.srt 5.8 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/06. Control documentation and continuous monitoring.srt 5.8 KB
- ~Get Your Files Here !/03. 2. Scope of the System/02. Organization-level tasks P-1 to P-3.srt 5.7 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/01. Security and privacy governance, risk management, and compliance program introduction.srt 5.5 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/05. SDLC phases to RMF steps mapping.srt 5.4 KB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/02. Monitor and assess controls.srt 5.3 KB
- ~Get Your Files Here !/04. 3. Categorization of a System/04. Define and categorize a system.srt 5.1 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/02. Principles of information security.srt 4.9 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/04. Control tailoring.srt 4.8 KB
- ~Get Your Files Here !/03. 2. Scope of the System/09. System-level tasks P-12 to P-13.srt 4.8 KB
- ~Get Your Files Here !/04. 3. Categorization of a System/02. Security categorization organization and guidance.srt 4.6 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/02. Select phase guiding documentation.srt 4.4 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/04. Control assessment.srt 4.3 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/06. SAR and PAR report preparation.srt 4.3 KB
- ~Get Your Files Here !/03. 2. Scope of the System/06. System-level tasks P-8 to P-9.srt 3.8 KB
- ~Get Your Files Here !/02. 1. Security and Privacy Governance, Risk Management, and Compliance Program/04. Risk response.srt 3.4 KB
- ~Get Your Files Here !/03. 2. Scope of the System/08. Review the seven system-level data governance roles.srt 3.3 KB
- ~Get Your Files Here !/03. 2. Scope of the System/05. System-level tasks.srt 3.3 KB
- ~Get Your Files Here !/04. 3. Categorization of a System/07. RMF to SDLC mapping.srt 3.1 KB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/05. Ongoing authorization and system disposal.srt 3.0 KB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/01. Phase 3 Implement – overview.srt 3.0 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/08. POA&M preparation.srt 3.0 KB
- ~Get Your Files Here !/03. 2. Scope of the System/11. System-level task P-18.srt 2.9 KB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/03. Ongoing assessments and risk response.srt 2.7 KB
- ~Get Your Files Here !/04. 3. Categorization of a System/06. Security categorization review and approval.srt 2.7 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/01. Phase 4 Assess – overview.srt 2.7 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/03. Risk analysis and risk response.srt 2.6 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/07. Security and privacy plan approval process.srt 2.6 KB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/01. Phase 6 Monitor – overview.srt 2.5 KB
- ~Get Your Files Here !/04. 3. Categorization of a System/05. National security systems (NSS).srt 2.3 KB
- ~Get Your Files Here !/04. 3. Categorization of a System/03. Security categorization process.srt 2.3 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/08. Select phase document review.srt 2.3 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/01. Phase 5 Authorization – overview.srt 2.3 KB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/04. Unofficial POA&M.srt 2.1 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/02. Assessor selection.srt 2.0 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/06. Authorization reporting.srt 2.0 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/02. Authorization package assembly.srt 2.0 KB
- ~Get Your Files Here !/03. 2. Scope of the System/01. Prepare phase overview.srt 2.0 KB
- ~Get Your Files Here !/03. 2. Scope of the System/04. Organization-level tasks review.srt 1.9 KB
- ~Get Your Files Here !/09. 8. Compliance Maintenance/06. Monitor review.srt 1.6 KB
- ~Get Your Files Here !/05. 4. Selection of Security and Privacy Controls/05. Control allocation.srt 1.6 KB
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/07. Remediation options.srt 1.6 KB
- ~Get Your Files Here !/06. 5. Implementation of Security and Privacy Controls/05. Implementation phase review.srt 1.2 KB
- ~Get Your Files Here !/03. 2. Scope of the System/12. Review prepare tasks at system level.srt 1.2 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/07. Phase 5 Authorization review.srt 1.1 KB
- ~Get Your Files Here !/08. 7. System Compliance and Authorization/05. Authorization decisions drills.srt 1.0 KB
- ~Get Your Files Here !/01. Certified Governance Risk Management and Compliance Overview/01. Course overview.srt 778 bytes
- ~Get Your Files Here !/04. 3. Categorization of a System/01. Phase 1 Categorize – overview.srt 663 bytes
- ~Get Your Files Here !/07. 6. Assessment and Audit of Security and Privacy Controls/09. Assessment phase review.srt 572 bytes
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.