Future Skills Fiesta:
 Get up to 30% OFF on Career Booster Combos
D H M S

GRC Hands-on Training in New York
Read Reviews

InfosecTrain’s GRC Training Course in New York explores the essentials of governance, risk, and compliance (GRC) in information security. Combining theory with practical exercises, it covers the CIA Triad, governance frameworks (COSO, COBIT), security policy creation, legal compliance, and risk management. Participants engage in case studies and hands-on tasks to learn about implementing security controls, risk assessment, and GRC plan development, equipping them for effective organizational GRC integration.
Watch Intro Video

Course Highlights

  • 40-Hour LIVE Instructor-led Training
  • Learn with Real-world Scenarios
  • Practical Approach
  • Highly Interactive and Dynamic Sessions
  • Immersive Learning
  • Learn from Industry Experts
  • Career Guidance and Mentorship
  • Extended Post Training Support
  • Access to Recorded Sessions

Accredited By

Choose your Preferred Learning Mode

ON DEMAND TRAINING

Learn on Your Own Time
1-to-1 learning
Customized Solutions

Contact US

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business

you were looking for your convenient time & date

REQUEST A BATCH

Course Description

The GRC Training Course in New York from InfosecTrain offers a comprehensive exploration of Governance, Risk, and Compliance (GRC) within the realm of information security. This course encompasses both theoretical knowledge and practical exercises, covering essential topics like the CIA Triad, principles of information security, and the importance of GRC. Participants will delve into various governance frameworks such as COSO and COBIT, develop and implement security policies, understand legal and regulatory compliance, and explore audit methodologies. The course also provides hands-on experience in setting up security controls, compliance frameworks and standards, risk management practices, and developing a GRC plan. Through interactive case studies and role-play exercises, learners gain real-world insights into governance structures, board dynamics, risk assessment, and mitigation strategies, preparing them for effective GRC integration in businesses.

Target Audience

  • IT Analysts
  • System Administrators
  • Network Engineers
  • Business Analysts
  • Project Managers
  • Security Governance Consultants
  • Compliance Analysts
  • Risk Managers

Pre-Requisite

  • Fundamental IT knowledge is required
  • Prior experience in IT, security, or compliance roles can be beneficial but is not mandatory

GET A FREE DEMO CLASS

For
Captcha*
7 + 60 =
loader-infosectrain

Course Objectives

You will be able to:

  • Understand the basics of Governance, Risk, and Compliance (GRC), along with the principles of information security and the critical CIA Triad.
  • Analyze and derive insights from interactive case studies and real-world incidents to apply GRC principles effectively.
  • Gain expertise in key governance frameworks like COSO and COBIT and learn to identify and assess organizational governance structures.
  • Enhance knowledge of crucial laws and regulations such as GDPR and HIPAA, essential for legal and regulatory compliance.
  • Understand and apply best practices in audit methodology, including the purpose and process of auditing.
  • Develop practical insights into integrating GRC practices effectively within businesses through case studies and creating a GRC plan.

Course Content

Introduction to GRC

  • Introduction to GRC
  • Understanding GRC (Theory)
  • Principles of Information Security (Theory)
  • The CIA Triad: Confidentiality, Integrity, Availability (Theory)
  • Importance of Governance, Risk, and Compliance (GRC) (Theory)
  • Interactive Case Study Analysis (Practical)
  • Analysis of Real-World Incidents (Practical)
  • Governance Frameworks and Models (Theory)
  • Overview of Various Governance Frameworks (e.g., COSO, COBIT) (Theory)
  • Practical Exercise: Identifying Governance Structures in Organizations (Practical)
  • Board Dynamics and Decision-Making (Theory)
  • Role-Play Exercise on Board Meetings and Decision-Making Processes (Practical)

 

Security Policies and Governance

  • Developing and Implementing Security Policies (Theory)
  • Key Components of Security Policies (Theory)
  • Workshop: Creating a Security Policy (Practical)
  • Governance Structures and Strategies (Theory)
  • Roles and Responsibilities in Governance (Theory)
  • Best Practices in Information Security Governance (Practical)
  • Legal and Regulatory Compliance (Theory)
  • Understanding Key Laws and Regulations (e.g., GDPR, HIPAA) (Theory)

 

Audit

  • Audit Methodology (Practical)
  • Audit Definition and Real-Time Usage (Practical)
  • Best Practices in the Audit Methodology (Practical)

 

Security Controls and Compliance Frameworks

  • Implementing Security Controls (Theory)
  • Types of Security Controls (Preventive, Detective, Corrective) (Theory)
  • Types of Security Areas (Access Control, Change Management, BC/DR, Incident Management, Network Security, Communication Security, Encryption)(Theory)
  • Setting Up the Right Controls (Theory)
  • Hands-on: Setting Up Security Controls in a Simulated Environment (Practical)
  • Compliance Frameworks and Standards (Theory)
  • Walkthrough of ISO 27001 Framework Design and Implementation Aligning with a Real-Time Example (Practical)
  • Workshop: Aligning Policies with Compliance Standards (Practical)
  • Integration of Data Privacy Through Data Privacy Impact Assessment (DPIA) (Practical)
  • Role of Technical Knowledge in GRC (Theory)
  • Extent of Expertise Required in the GRC – Real-World Simulation (Practical)
  • Workshop: Assessing System Controls Based on ISO 27001 (Practical)

 

Risk Management in Information Security

  • Risk Assessment and Analysis (Theory)
  • Risk Management (Including Top Frameworks to be Followed for Best Practices) (Theory)
  • Techniques for Risk Identification and Evaluation (Theory)
  • Practical Exercise: Conducting a Risk Assessment (Practical)
  • Mitigation Strategies and Risk Treatment (Theory)
  • Developing Risk Response Strategies (Theory)
  • Case study: Risk Mitigation in Action (Practical)
  • Tools and Techniques for Risk Management (Theory)
  • Utilizing Software and Tools for Risk Management (Theory)

 

Risk Management in Information Security

  • GRC in Practice (Theory)
  • Case Studies of GRC Integration in Businesses (Practical)
  • Developing a GRC Plan (Practical)
  • Final Project: Creating a Comprehensive GRC Plan for an Organization (Practical)
  • Typical Interview Questions (Practical)
  • Course Review and Q&A
  • Review of Key Concepts and Questions

Need customized curriculum Talk to Advisor

Here What people are saying about InfosecTrain

Why InfosecTrain

Guaranteed* to run Courses

4 hrs/day in Weekday/Weekend

Customized Training

Technical Support Post Training

Access to the recorded session

Accredited Instructors

TOP