Certified in Governance, Risk and Compliance (CGRC) | Course Outline | ATG Learning

Course Outline

Certified in Governance, Risk and Compliance (CGRC)

CISP-1003 | Day | 5 Days
Bootcamp day course times are 9am - 6pm. Bootcamp night course times are 6pm - 10pm

Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification. The CGRC is a proven way to demonstrate your knowledge and skills to integrate governance, performance management, risk management and regulatory compliance within your organization.

CGRC professionals utilize frameworks to integrate security and privacy within organizational objectives, better enabling stakeholders to make informed decisions regarding data security, compliance, supply chain risk management and more.

Upcoming Dates:

  • Nov 10, 2025 - Nov 14, 2025
  • Jan 26, 2026 - Jan 30, 2026
  • Mar 16, 2026 - Mar 20, 2026
  • May 04, 2026 - May 08, 2026
  • Jul 06, 2026 - Jul 10, 2026

Who should take this course

The CGRC is ideal for IT, information security and information assurance practitioners and contractors who use the RMF in:

Course Objectives

This official (ISC)² training is based on the seven domains found on the Common Body of Knowledge (CBK) for CGRC, ensuring students successfully prepare for the CGRC certification exam while also enhancing their overall competencies in authorizing and maintaining information systems.

Course Outline

Domain 1: Security and Privacy Governance, Risk Management, and Compliance Program

1.1 - Demonstrate knowledge in security and privacy governance, risk management, and compliance program

1.2 - Demonstrate knowledge in security and privacy governance, risk management and compliance program processes

1.3 - Demonstrate knowledge of compliance frameworks, regulations, privacy, and security requirements

Domain 2: Scope of The System

2.1 - Describe the system

2.2 - Determine security compliance required

Domain 3: Selection and Approval of Framework, Security, and Privacy Controls

3.1 - Identify and document baseline and inherited controls

3.2 - Select and tailor controls

Domain 4: Implementation of Security and Privacy Controls

 4.1 - Develop implementation strategy (e.g., resourcing, funding, timeline, effectiveness)

4.2 - Implement selected controls

 4.3 - Document control implementation

Domain 5: Assessment/Audit of Security and Privacy Controls

 5.1 - Prepare for assessment/audit

 5.2 - Conduct assessment/audit

 5.3 - Prepare the initial assessment/audit report

5.4 - Review initial assessment/audit report and plan risk response actions

5.5 - Develop final assessment/audit report

5.6 - Develop risk response plan

 Domain 6: System Compliance

6.1 - Review and submit security/privacy documents

6.2 - Determine system risk posture

6.3 - Document system compliance

Domain 7: Compliance Maintenance

7.1 - Perform system change management

7.2 - Perform ongoing compliance activities based on requirements

7.3 - Engage in audits activities based on compliance requirements

7.4 - Decommission system when applicable