Certified in Governance Risk Management & Compliance (CGRC) Part 1


The definitive course in Compliance, Governance and Risk Management

Compliance, Governance and Risk Management or GRC are the cornerstones of organisational risk management and overall improved leadership. GRC helps align business operations and IT security with the larger organisational goals, mitigates expenditure, helps you stay on top of compliance requirements and improves decision-making. GRC is more important than ever today as the risk landscape becomes more and more complex. This course will help any IT security and cyber professional to evolve in their career with a better grasp of GRC concepts.

Benefits of choosing this course

Benefits of choosing the CGRC (Part 1) course


Demonstrate your knowledge of GRC and your ability to apply its principles in your organisation.


Equip yourself with the skills and knowledge required to become a well-rounded GRC professional and launch your career in one of the most lucrative fields today.


Widen your avenues in the field of cybersecurity by acquiring knowledge of strategy, governance, risk, compliance, ethics, internal control, security, privacy, and audit activities.

Highlights of the CGRC (Part 1) course


One of the most detailed GRC courses available in the market with 4 modules and 14 sections within those modules.


Access to a wealth of practical training sessions with a whopping 84 lab sessions.


Self-assessment options with varying levels of difficulty for each module to ensure enhanced learning and evaluation.

  • Key Learning Objectives
  • Downloads
  • About
  • Key Learning Objectives

      After completing this intensive course, you will have a robust understanding of the following concepts:
    • Fundamentals of Information Technology, CISC-CIA Triad
    • Ethical Hacking concepts, types of hackers, different types of testing
    • Essential Information Security Legislations and Regulations
    • Network Fundamentals and Components of Data Communication

    • Computer Network Architecture, Network Topology and Network Cables
    • Subnetting, Supernetting, Routing, VLAN, VPN, Firewalls and IP Tables .
    • Windows Fundamentals, Windows NT Architecture and Windows 10 Architecture
    • Basics of Unix and Linux; Kali and various Linux commands
    • Fundamentals of Network Security - Reconnaissance, Packet Crafting, Nmap, Metasploit Framework, Netcat and Ncat
    • The fundamental concepts behind database systems
    • Key components within a database deployment
    • The integration of databases into business solutions
    • The process of thorough database assessment, including tools and methodologies

    • Techniques used by hackers to exploit database flaws and vulnerabilities
    • Practical assessment and attack vector considerations, through hands-on experience .
    • Web Application Security - Secure Coding Techniques, Threat Modelling, Secure Coding Methods
    • OWASP Top 10, Risk-Based Security Testing, and Source Code Analysis
  • Direct Downloads

    Directly download the full Learning Objectives of the course here

    Templates. Worksheets & Mind-maps

    When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.

    The image immediately below is a gallery view of some of the templates and collateral available to students.

    Continuing Professional Development

    CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).

    CIPR Student-Only Incident Response Plan Template

    As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.

  • About

Example Curriculum

  Module 1: Fundamentals, Section 1
Available in days
days after you enroll
  Module 1: Network Fundamentals, Section 2
Available in days
days after you enroll
  Module 1: Fundamentals, Section 3
Available in days
days after you enroll
  Module 1: Fundamentals, Section 4
Available in days
days after you enroll
  Module 1: Fundamentals, Section 5
Available in days
days after you enroll
  Fundamentals Quiz
Available in days
days after you enroll
  Module 2: Network Security, Section 1
Available in days
days after you enroll
  Module 2: Network Security, Section 2
Available in days
days after you enroll
  Network Security Quiz
Available in days
days after you enroll
  Module 3: Server Security, Section 1
Available in days
days after you enroll
  Module 3: Server Security, Section 2
Available in days
days after you enroll
  Module 3: Server Security, Section 3
Available in days
days after you enroll
  Module 3: Server Security, Section 4
Available in days
days after you enroll
  Server Security Quiz
Available in days
days after you enroll
  Module 4: Web Application Security
Available in days
days after you enroll
  Module 4: Web Application Security, Section 2
Available in days
days after you enroll
  Module 4: Web Application Security, Section 3
Available in days
days after you enroll
  Web Application Security Quiz
Available in days
days after you enroll

Sign up and Start Today


Pay-in-full in your local currency (where available)


We take all major forms of payment and we use secure checkout.

To fulfill your organisational needs for Governance, Risk and Compliance, a fully-remote, virtual cybersecurity specialist service is also a great & cost-effective idea worth considering.