We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

GRC Analyst

Search

Clear Expand Collapse

ISC2 CISSP: Certified Information Systems Security Professional (2024)

Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP

Course duration Duration: 39 hours, 32 min.

CompTIA CySA+ (CS0-003)

The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.

Course duration Duration: 15 hours, 11 min.

Business Continuity and Disaster Recovery

We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.

Price
Course duration Duration: 5 hours, 22 min.

Accredited ISO/IEC 27001 Foundation

In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.

Course duration Duration: 10 hours, 43 min.

COBIT 2019 Foundation

This course is designed for for business and IT professionals alike and helps prepare for the COBIT 2019 Foundation Certificate. Manage and govern your enterprise IT cybersecurity more effectively today with the COBIT 2019 Foundation!

Course duration Duration: 6 hours, 12 min.

ISACA Certified Information Security Manager (CISM)

The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.

Course duration Duration: 13 hours, 49 min.

Shaping Cyber Policy with Grant Schneider

Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.

Course duration Duration: 35 minutes

Winning the Account Takeover Battle

Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
 

Price
Course duration Duration: 35 minutes

Can Zero Trust & Risk Management Coexist?

Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.

Price
Course duration Duration: 31 minutes

SOC 2 Compliance

SOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!

Course duration Duration: 16 minutes

The Cybersecurity Legal, Privacy and Compliance Outlook

Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss:
The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.

Course duration Duration: 35 minutes

ISO/IEC 27001 Foundation

ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.

Course duration Duration: 5 hours

Accredited SIAM Foundation

SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.

Course duration Duration: 18 hours, 30 min.

Accredited Management of Risk® Practitioner

Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.

Course duration Duration: 11 hours

Accredited Management of Risk® Foundation

Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.

Course duration Duration: 23 hours

CISA: Certified Information Systems Auditor

This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.

Course duration Duration: 26 hours, 40 min.

CRISC: Certified in Risk and Information Systems Control

The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.

Course duration Duration: 16 hours, 30 min.

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

Navigating Data Privacy in the Age of AI

As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!

Price
Course duration Duration: 25 minutes

Efficiently Reducing Risk in Sustained Cyber Conflict

MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.

Price
Course duration Duration: 25 minutes

Navigating ICS and OT Compliance

Navigating ICS and OT Compliance is for industrial and critical infrastructure technical leaders and technical professionals. Get the resources you need to implement your ICS and OT cybersecurity compliance strategy today!

Course duration Duration: 45 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement