CGRC® Training and Certification

Course 2061

  • Duration: 5 days
  • Exam Voucher: Yes
  • Language: English
  • Level: Foundation

This official ISC2 Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam. The Certified Authorisation Professional (CAP®) has changed its name to Certified in Governance, Risk and Compliance (CGRC). This is only a title change, so the course modules, prerequisites, and delivery remain the same.  

An individual certified in Governance, Risk and Compliance (CGRC) is an information security practitioner who advocates for security risk management in pursuit of information system authorisation. This is needed to support an organisation’s mission and operations in accordance with legal and regulatory requirements.

Passing the CGRC Exam meets U.S. DoD Directive 8140/8570.01 Management (IAM) Level-I and Management (IAM) Level-II requirements.

CGRC Training Delivery Methods

  • In-Person

  • Online

  • Upskill your whole team by bringing Private Team Training to your facility.

CGRC Training Information

In this CGRC Certification and Training, you will learn how to:

  • Information Security Risk Management Program.
  • Scope of the Information System.
  • Selection and Approval of Security and Privacy Controls.
  • Implementation of Security and Privacy Controls.
  • Assessment/Audit of Security and Privacy Controls.
  • Authorisation/Approval of Information System.
  • Perform Continuous Monitoring.

CGRC Training Prerequisites

To qualify for the CGRC certification, you must have a minimum of two years of cumulative, paid, full-time work experience in one or more of the seven domains of the CGRC Common Body of Knowledge (CBK).

CGRC Certification Information

To maintain certification, you must:

  • Earn and post a minimum of 20 ISC2 CPE credits per year
  • Comply with ISC2's Code of Professional Ethics

Attendees can self-submit our courses for the following CPE credit:

  • Group A credits for attending any of our cybersecurity courses, and
  • Group B General Education credits for any other Learning Tree course they attend.
  • Or ISC2 members can submit CPE credits directly to the CPE portal in the Members section of the ISC2 website

CGRC Training and Certification Outline

1.1 Understand the foundation of an organisation's information security risk management programme » Principles of information security

  • Risk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organisation for Standardisation (ISO) 27001, International Organisation for Standardisation (ISO) 31000)
  • System Development Life Cycle (SDLC)
  • Information system boundary requirements
  • Security controls and practices
  • Roles and responsibilities in the authorisation/approval process

1.2 Understand risk management programme processes

  • Select programme management controls
  • Privacy requirements
  • Determine third-party hosted information systems
  • Understand regulatory and legal requirements
  • Familiarise with governmental, organisational, and international regulatory security and privacy requirements (e.g., International Organisation for Standardisation (ISO) 27001, Federal Information Security Modernisation Act (FISMA), Federal Risk and Authorisation Management Programme (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
  • Familiarise with other applicable security-related mandates

2.1 Define the information system

  • Determine the scope of the information system
  • Describe the architecture (e.g., data flow, internal and external interconnections)
  • Describe information system purpose and functionality

2.2 Determine categorisation of the information system

  • Identify the information types processed, stored, or transmitted by the information system
  • Determine the impact level on confidentiality, integrity, and availability for each information type (e.g., Federal Information Processing Standards (FIPS) 199, International Organisation for Standardisation/ International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
  • Determine information system categorisation and document results

3.1 Identify and document baseline and inherited controls 3.2 Select and tailor controls to the system

  • Determine applicability of recommended baseline and inherited controls
  • Determine appropriate use of control enhancements (e.g., security practices, overlays, countermeasures)
  • Document control applicability

3.3 Develop a continuous control monitoring strategy (e.g., implementation, timeline, effectiveness)

3.4 Review and approve security plan/Information Security Management System (ISMS)

4.1 Implement selected controls

  • Determine mandatory configuration settings and verify implementation in accordance with current industry standards (e.g. appropriate organisation entities (e.g., physical security, personnel security, privacy)

5.1 Prepare for assessment/audit

  • Determine assessor/auditor requirements
  • Establish objectives and scope
  • Determine methods and level of effort
  • Determine necessary resources and logistics
  • Collect and review artefacts (e.g., previous assessments/audits, system documentation, policies)
  • Finalise the assessment/audit plan

5.2 Conduct assessment/audit

  • Collect and document assessment/audit evidence
  • Assess/audit implementation and validate compliance using approved assessment methods (e.g., interview, test and examine)

5.3 Prepare the initial assessment/audit report

  • Analyse assessment/audit results and identify vulnerabilities
  • Propose remediation actions

5.4 Review initial assessment/audit report and perform remediation actions

  • Determine risk responses
  • Apply remediations
  • Reassess and validate the remediated controls

5.5 Develop final assessment/audit report

5.6 Develop a remediation plan

  • Analyse identified residual vulnerabilities or deficiencies
  • Prioritise responses based on risk level
  • Identify resources (e.g. financial, personnel, and technical) and determine the appropriate timeframe/ schedule required to remediate deficiencies

6.1 Compile security and privacy authorisation/approval documents

  • Compile required security and privacy documentation to support authorisation/approval decision by the designated official

6.2 Determine information system risk

  • Evaluate information system risk
  • Determine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)
  • Determine residual risk

6.3 Authorise/approve information system

  • Determine terms of authorisation/approval

7.1 Determine the impact of changes to information systems and the environment

  • Identify potential threats and impacts to the operation of information systems and environments
  • Analyse risk due to proposed changes accounting for organisational risk tolerance » Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
  • Implement proposed changes
  • Validate changes have been correctly implemented
  • Ensure change management tasks are performed

7.2 Perform ongoing assessments/audits based on organisational requirements

  • Monitor network, physical, and personnel activities (e.g., unauthorised assets, personnel, and related activities)
  • Ensure vulnerability scanning activities are performed
  • Review automated logs and alerts for anomalies (e.g., security orchestration, automation, and response)

7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency reports, news reports)

7.4 Actively participate in response planning and communication of a cyber event

  • Ensure response activities are coordinated with internal and external stakeholders
  • Update documentation, strategies, and tactics incorporating lessons learned

7.5 Revise monitoring strategies based on changes to industry developments introduced through legal, regulatory, supplier, security, and privacy updates

7.6 Keep designated officials updated about the risk posture for continuous authorisation/approval

  • Determine ongoing information system risk
  • Update risk register, risk treatment, and remediation plan

7.7 Decommission information system

  • Determine information system decommissioning requirements
  • Communicate decommissioning of information system
  • Remove information system from operations

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

CGRC Training FAQs

CGRC® Training and Certification is a programme designed by ISC2 to prepare information security practitioners to become Certified in Governance, Risk and Compliance (CGRC) professionals. This certification validates that a professional has the necessary knowledge and skills to support an organisation's mission and operations in accordance with legal and regulatory requirements related to security risk management.

The Certified Authorisation Professional certification covers the RMF (Risk Management Framework) in great detail.

It is the only security certification under the DoD8570 Mandate that aligns with each RMF step.

Yes. ISC2 changed the name of the Certified Authorisation Professional (CAP) to the Certified in Governance, Risk and Compliance (CGRC) in order to “better represent the knowledge, skills and abilities required to earn and maintain this certification as the content reaches beyond authorisation.” The change is effective as of February 15, 2023.

You can read about the announcement here. CAP name is changing to CGRC – what does that mean... - ISC2 Community (isc2.org).

Yes, the Certified Authorisation Professional (CAP®) has changed its name to the Certified in Governance, Risk and Compliance (CGRC). However, this is only a title change, and the course modules, prerequisites, and delivery remain the same.

ISC2 will update your digital certificate in your account on their site. To read more on the change, please visit ISC2’s FAQ

A minimum of two years of cumulative, paid, full-time work experience in one or more of the seven domains of the CGRC Common Body of Knowledge (CBK).

Yes! We know your busy work schedule may prevent you from getting to one of our classrooms, which is why we offer convenient online training to meet your needs wherever you want. This course is available in class, online, and on demand.

The CGRC is ideal for IT (Information Technology), information security, and information assurance practitioners and contractors who use the RMF in:

  • The U.S. Federal Government, such as the U.S. Department of State or the Department of Defense (DoD)
  • The military
  • Civilian roles, such as federal contractors
  • Local governments
  • Private sector organisations

CGRC Training is available through in-person and online delivery methods.

In CGRC Certification and Training, you will learn about information security risk management programmes, scoping information systems, selecting and approving security and privacy controls, implementing security and privacy controls, assessing and auditing security and privacy controls, and authorizing information systems. You will also learn how to perform continuous monitoring.

To qualify for the CGRC certification, you must have a minimum of two years of cumulative, paid, full-time work experience in one or more of the seven domains of the CGRC Common Body of Knowledge (CBK).

To maintain CGRC certification, you must earn and post a minimum of 20 ISC2 CPE credits per year and comply with ISC2's Code of Professional Ethics. As an ISC2 CPE submitter, Learning Tree can submit courses on your behalf to ISC2 for CPE credit.

You can also earn Group A credits for attending any of our cybersecurity courses, and Group B General Education credits for any other Learning Tree course you attend. Alternatively, ISC2 members can submit CPE credits directly to the CPE portal in the Members section of the ISC2 website.