SKILL BENCHMARK

Security+: Governance, Risk, and Compliance Competency (Intermediate Level)

  • 25m
  • 25 questions
The Security+: Governance, Risk, and Compliance Competency benchmark will measure your ability to recognize key terms and concepts related to governance, risk, and compliance. You will be evaluated on policies, regulations, standards, & frameworks and risk management, privacy, & sensitive data security. A learner who scores high on this benchmark demonstrates that they have the skills related to understanding key governance, risk, and compliance terminology and concepts.

Topics covered

  • compare different roles and responsibilities, as in data owners, controllers, processors, custodians, and stewards
  • compare risk types, such as internal, external, and multiparty
  • define data policies, like data classification, governance, and retention
  • define regulations, standards, and legislation, such as PCI-DSS, GDPR, and various national, territory, or state laws
  • define risk analysis terms, as in risk register, inherent risk, residual risk, and control risk
  • define various data type classifications, like public, sensitive, and critical
  • describe business impact analysis concepts, like recovery time vs. recovery point objectives, mean time to repair, and mean time between failures, and outline a disaster recovery plan
  • describe credential policies, including service accounts, administrator, and root accounts
  • describe personnel policies, like AUP, job rotation, mandatory vacations, separation of duties, least privilege, clean desk space, background checks, and non-disclosure agreements (NDAs)
  • describe privacy-enhancing technologies, such as tokenization, data minimization and masking, and anonymization
  • describe risk management strategies, like acceptance, avoidance, transference, and mitigation
  • describe the purpose of various AWS cloud computing services, such as CloudWatch, CloudTrail, and AWS Config
  • examine common Windows logs, like security, application, and system logs
  • examine key frameworks like CIS, NIST, RMF/CSF, ISO 27001/27002/27701/31000, SSAE SOC 2 type II/III, and Cloud Security Alliance (CSA)
  • explore privacy concepts, like information's life cycle, impact assessment, terms of agreement, and privacy notices
  • explore the consequences of breaches, such as fines and identity theft
  • identify lessons learned and their relationship to AARs
  • list disasters and classify their types, such as environmental, human-made, and external
  • outline how to use Linux logging utilities, such as systemd and auditd
  • outline how to work with Wireshark's output
  • recognize the importance of log aggregation and collection tools
  • summarize the best practices and guidelines for dealing with visibility and reporting
  • survey third-party risks concepts, such as vendors, supply chains, business partners, SLA, MOU, MSA, BPA, EOL, EOS, and NDA
  • survey various benchmarks and secure configuration guides, as in platform/vendor-specific guides for web servers, OS, application servers, and network infrastructure devices
  • survey various organizational polices, such as change management , change control, and asset management

RECENTLY ADDED COURSES