Governance, Risk and Compliance Express Courses

Get Ahead in GRC + Earn CPE Credits

Be a force that mitigates risk and aligns to goals with ISC2 Governance, Risk and Compliance Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.


Cloud Governance, Risk and Compliance

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

During this learning experience, you’ll hear from an industry professional about popular governance, risk and compliance (GRC) reports — what they mean, how they can help, how they might be misinterpreted and what you can do to leverage them. Learn to leverage the reports to benefit your organization.

Start Course


Data Privacy and Protection: Introduction to Compliance Requirements

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE +SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

Addressing privacy and data protection requirements can be a challenge. It’s important to understand the different terms and the philosophies behind the regulations. One useful model is the General Data Protection Regulation (GDPR). The principles it outlines, adopted throughout the EU, help shape policies that meet local and global requirements.

Start Course


Data Protection: Complying with Regulations, Laws, Standards and Frameworks

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

Follow the SemiSwiss team as they discuss global data protection and privacy regulations, as well as privacy frameworks that can identify best practices when working toward regulatory compliance. Even as the needs of each organization may differ, it is important to remember that data protection must always be at the forefront of security practices.

Start Course


Data Protection: Repairing Policies and Procedures

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

Follow the SemiSwiss team as they refine solutions necessary to repair their data protection reputation, examining and classifying various policies, procedures and documentation requirements. You’ll learn about data protection impact assessments and how to use risk ranking to prioritize efforts. Learn how the SemiSwiss team implemented solutions to bring their organization into compliance.

Start Course


8 Steps to Establish a Successful Governance, Risk and Compliance Program

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Effective information security programs require the integration of three elements to be truly effective: governance, risk and compliance. Governance provides the framework for managing and overseeing security programs, risk management provides the means for identifying and mitigating potential risks, and compliance provides the means for ensuring that the organization adheres to relevant laws and regulations. This learning experience walks you through eight steps to follow for implementing effective information security governance, risk and compliance.

Start Course


Global Approaches to Cyber Policy, Legislation and Regulation

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: INTERACTIVE VIRTUAL TOUR | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

An April 2023 report by the Royal United Services Institute and ISC2 explores the state of current cyber policy, legislation and regulation in the UK, US, EU, Canada, Japan and Singapore. By outlining the challenges facing each global region and the measures taken to address them, the report provides a large-scale picture of the cybersecurity landscape in which government and private industry are operating now and in the future. For cyber leaders, the report demonstrates the importance of approaching decision making informed by legislation and regulations beyond their own jurisdictions, as well as being more active participants in the process of policy making. By providing calls to action and resources for conducting research, this learning experience is a starting point for taking action and getting involved in various cybersecurity communities informed by a global approach.

Start Course


Guidance for Maintaining GRC and Security Posture for Multicloud Infrastructures

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

This course is designed to enable you, as a security leader in your organization, to govern, monitor and manage your cloud security posture and cloud workload protection — not only for the infrastructure you have in place now but for any you may add in the future.

Start Course


ICS Standards, Regulations and Frameworks

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

Industrial control systems (ICS) play a crucial role in managing and controlling processes in industries, such as manufacturing, energy and critical infrastructure. Given their significance and potential vulnerabilities, the implementation of standards, regulations and frameworks becomes essential to ensure their security, reliability and interoperability.

Start Course


Jumpstarting the Key Components of Your GRC Program

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

A GRC program is an essential aspect of securing an organization’s systems and data. In this learning experience, you’ll hear from an industry expert about the components of an effective GRC program and what to consider when you’re making improvements to or developing a new program to meets your organization’s unique requirements.

Start Course


Security Risk Management in a Small to Medium Business Environment

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

Small and medium-sized businesses (SMBs) often find themselves in a balancing act. They want security measures to protect their organizations and customers, but how do they pay for them with limited budgets and resources? While SMBs generally do not have the budgets of large enterprises, they often face the same security threats and must prepare for them accordingly. To be an effective security leader in your SMB, you need to understand various risk factors, analyze risk in your organization and prepare for a potential data breach.

Start Course


Supply Chain Risk Management through Governance, Risk and Compliance

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

With the growing complexity of supply chains, it’s more important than ever to keep your organization’s supply chain safe and secure from cyberattacks and other threats. Information security governance, risk and compliance enables you to do just that. These three closely related concepts are essential for ensuring the security and integrity of your information systems and data.

Start Course


Why ISC2 Express Courses?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Access quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Express Courses you get:

  • Self-paced cybersecurity education available on demand 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your knowledge today.