GET CERTIFIED

Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P, distance learning and online certification program
Overview

Cybersecurity has become a major challenge for companies and organizations around the world. They need managers and professionals equipped with the knowledge, skills, and abilities to cope with evolving threats and vulnerabilities.

In almost all companies and organizations, the C-Level executives and the board believe that they are impacted by the cybersecurity skills shortage, and have difficulties to stay ahead of, and to cope with, evolving threats and vulnerabilities. They search for cybersecurity experts that are adequately trained, including those from nontraditional backgrounds. Unfortunately, there are not enough cybersecurity professionals available for hire, so entities are fighting for the same talent.

Additionally, there is an acute shortage of cybersecurity skills like counterintelligence analysis and defense, to deal with the intelligence collection and attacks by foreign adversaries.

Foreign intelligence entities and the state-sponsored groups they support are actively targeting information, assets, and technologies that are vital to the public and the private sector. Cybersecurity professionals must raise awareness about these foreign intelligence threats, the risks they pose, and the defensive measures necessary for individuals and organizations to safeguard their assets.

Objectives

The CC(GRC)P program has been designed to provide with the knowledge and skills needed to understand and support firms and organizations in cyber risk and compliance management. The course provides with the skills needed to pass the Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P exam.

Target Audience

The CC(GRC)P certification program is beneficial to:
- Managers and employees working at the strategic, tactical, and operational levels of information security, IT and risk management.
- Information security managers, employees, auditors, and consultants.
- Threat analysts.
- Vulnerability assessment managers, employees, auditors, and consultants.
- Risk and compliance managers, employees, auditors, and consultants.
- IT managers, employees, auditors, and consultants.
- Network, systems, and security administrators.
- Senior managers involved in risk and compliance management.
- Data protection and privacy managers, employees, auditors, and consultants.
- IT, information security, risk and compliance management vendors, suppliers, and service providers.

Course Synopsis

Part 1.

- Introduction.
- The CC(GRC)P exam.
- Definitions.
- Cyber risks today, and what is different for organizations and employees.

Part 2.

Who is attacking us? How?
- Professional criminals and information warriors.
- Attacks on the critical infrastructure.
- No evidence of a problem is no evidence of no problem.
- From the U.S. National Infrastructure Protection Plan (NIPP).
- Attacks on the internet infrastructure.
- Widespread automated attacks.
- Threats, harassment, and other criminal offences.
- Botnets.
- The Necurs botnet.
- The ZeuS Trojan.
- Forgery and misrepresentation.
- Technology, intellectual property, trade secrets and proprietary information.
- The 2018 Foreign Economic Espionage in Cyberspace, from the National Counterintelligence and Security Center.
- Travel security.
- Hardware attacks.
- Case studies.
- Software attacks.
- The WannaCry Ransomware Virus.
- Worm Nimda.
- Tiny Banker Trojan.
- Mobile Malware.
- Metamorphic and polymorphic malware.
- Weaponized pdfs.
- Packet Sniffing.
- Social Engineering.
- Reverse Social Engineering.
- Common social engineering techniques.
- Phishing.
- Clone phishing.
- Spear-phishing.
- Case Study: The Carbanak gang.
- Whaling, phishing for executives.
- Smishing and vishing attacks.

Deep web, dark web, and the false sense of privacy.
- The deep web.
- The dark web.
- Darknet and overlay networks.
- The Onion Router.
- Tor and anonymity.
- De-anonymizing Tor users.
- Tor “hidden” services.

Modus Operandi.
- Step 1 – Collecting information about persons and systems.
- Reconnaissance.
- Who has signed a confidentiality agreement?
- Vendors, suppliers, service providers.
- Marketing and cyber security.
- Example or publicly available information: EDGAR.
- Attacking systems and persons.
- Ideologies and cyber risk.
- Blackmailing employees, the art and the science.
- Employee collusion with external parties.
- Employees and their weaknesses and vulnerabilities.
- You have an affair?
- Romance fraudsters and criminals.
- Webcam blackmail.
- Case studies.
- Sextortion.
- Step 2 – Identifying possible targets and victims.
- Step 3 – Evaluation, recruitment, and testing.
- Testing the asset.
- Sleeper agents in the private sector.
- Step 4 - Privilege escalation.
- Step 5 – Identifying important clients and stakeholders.
- Step 6 – Critical infrastructure.
- Case study: Operation Aurora.
- Case study: Sony Pictures.

Part 3.

- The famous paradoxical trinity of Clausewitz.
- From Warfare to Cyber Warfare.
- Clausewitz, the paradoxical trinity.
- Cyberspace, a domain of war.
- Jus ad bellum, jus in bello, jus post bellum.
- Article 2(4) and Article 51, United Nations (UN) Charter.
- Is a cyber attack an armed attack?
- From the G7 Finance Ministers and Central Bank Governors.
- US Department of Defense (DoD) Law of War manual (2015), Cyber Operations.
- Government Accountability Office (GAO), Weapon Systems Cybersecurity.
- Information Operations (IO).
- Electronic Warfare (EW).
- Electromagnetic Spectrum Targets.
- Computer Network Operations (CNO).
- Psychological Operations (PSYOP).
- Military Deception (MILDEC).
- Operations Security (OPSEC).
- Information assurance (IA).
- Physical security.
- Defensive Information Operations.
- Net-centric warfare.
- Cyberspace and national security.
- Hackers, Spies, or Hybrid Warfare?
- Case studies.
- Challenges to Security in Space, Defense Intelligence Agency (DIA).
- Camouflage for the digital domain (2020), NATO Strategic Communications Centre of Excellence.

- Cyber Espionage.
- Espionage, Intelligence.
- Political, Economic, Military Intelligence.
- Competitive Intelligence vs. Economic or Industrial Espionage.
- Espionage, UK Centre for the Protection of National Infrastructure (CPNI).
- Espionage and other intelligence activities, Bundesamt für Verfassungsschutz (BfV, the Federal Office for the Protection of the Constitution).
- Cyber attacks controlled by intelligence services, Bundesamt für Verfassungsschutz (BfV).
- Counterintelligence (CI).
- Cyber Espionage.
- Open-Source Intelligence (OSINT).
- Case studies.
- Case study, Danish assessment of the cyber threat against Denmark.
- Office of Intelligence & Analysis Strategic Plan for Fiscal Years 2020-2024.

- The attribution problem.
- A Guide to Cyber Attribution, Director of National Intelligence (DNI).
- Plausible Deniability.
- Misinformation, disinformation, deception management, fabrication.
- Disinformation management.
- ENISA, Disinformation operations in cyber-space.
- ENISA, Active Defense and Offensive Countermeasures.

Part 4.

- The NIST Cybersecurity Framework.
- The Framework Core.
- The four elements:
- 1. Functions,
- 2. Categories,
- 3. Subcategories,
- 4. Informative References.
- The Functions:
- 1. Identify (ID),
- 2. Protect (PR),
- 3. Detect (DE),
- 4. Respond (RS),
- 5. Recover (RC).

- The Framework Profiles.
- The Framework Implementation Tiers.
- Tier 1: Partial.
- Tier 2: Risk Informed.
- Tier 3: Repeatable.
- Tier 4: Adaptive.

- Coordination of Framework Implementation.
- How to use the framework.
- Communicating Cybersecurity Requirements with Stakeholders.
- Methodology to Protect Privacy and Civil Liberties.

- NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management.
- The NIST privacy framework, January 16, 2020.
- Privacy Risk Management.
- Privacy Framework Basics.
- The Core.
- Functions, categories, subcategories.
- The Framework Profiles.
- The Framework Implementation Tiers.
- Tier 1: Partial.
- Tier 2: Risk Informed.
- Tier 3: Repeatable.
- Tier 4: Adaptive.
- How to Use the Privacy Framework.
- Using a simple model of “ready, set, go” phases.

Part 5.

- Demand for Cyber Risk and Information Security Professionals.
- From the National Initiative for Cybersecurity Careers and Studies (NICCS).
- Salaries, daily rates.
- Closing remarks.


Become a Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P

For secure payment we work with PayPal, the faster and safer way to make online payments. With PayPal we minimize the cost of administration and compliance with national and international laws, so we can keep the cost of our programs and services so low. You can also use Visa, MasterCard, Discover, or American Express cards, as well as local payment methods, depending on your country. Only PayPal receives your financial information. We receive your full name, your email, and your mail address.

When you click "PayPal" below, you will be redirected to the PayPal web site. If you prefer to pay with a card, you can click "Debit or Credit Card" that is also powered by PayPal. Your payment will be received by our strategic partner and service provider, Cyber Risk GmbH (Dammstrasse 16, 8810 Horgen, Switzerland, Handelsregister des Kantons Zürich, Firmennummer: CHE-244.099.341). Cyber Risk GmbH may also send certificates to all members.

We will send the program up to 24 hours after the payment. Please remember to check the spam folder of your email client too, as emails with attachments are often landed in the spam folder.

You have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our programs or services for any reason, all you must do is to send us an email, and we will refund the payment, no questions asked.

The all-inclusive cost is $297. There is no additional cost, now or in the future, for this program.



What is included in the price:

A. The official presentations (1,186 slides)

The presentations are effective and appropriate to study online or offline. Busy professionals have full control over their own learning and are able to study at their own speed. They are able to move faster through areas of the course they feel comfortable with, but slower through those that they need a little more time on.

B. Up to 3 online exam attempts per year

Candidates must pass only one exam to become CC(GRC)Ps. If they fail, they must study the official presentations and retake the exam. Candidates are entitled to 3 exam attempts every year.

If candidates do not achieve a passing score on the exam the first time, they can retake the exam a second time.

If they do not achieve a passing score the second time, they can retake the exam a third time.

If candidates do not achieve a passing score the third time, they must wait at least one year before retaking the exam. There is no additional cost for any additional exam attempts.

To learn more, you may visit: https://www.risk-compliance-association.com/Questions_About_The_Certification_And_The_Exams_1.pdf

https://www.risk-compliance-association.com/CC(GRC)P_Certification_Steps_1.pdf

C. The certificate

Processing and posting via registered mail with tracking number. Certificates are usually dispatched every 10 weeks.


Frequently Asked Questions

1. I want to learn more about the International Association of Risk and Compliance Professionals (IARCP).

The IARCP is wholly owned by Compliance LLC, a company incorporated in Wilmington NC and offices in Washington DC, a provider of risk and compliance training in 36 countries.

Several business units of Compliance LLC are very successful associations that offer standard, premium and lifetime membership, weekly or monthly updates, training, certification, Authorized Certified Trainer (ACT) programs, lobbying that raises awareness on certain problems, interest representation, and other services to their members.

2. Does the association offer training?

The IARCP offers distance learning and online certification programs in all countries, and in-house instructor-led training in companies and organizations in many countries.

A. Distance learning and online certification programs.

A1. Certified Risk and Compliance Management Professional (CRCMP). To learn more, you may visit: https://www.risk-compliance-association.com/Distance_Learning_and_Certification.htm

A2. Certified Information Systems Risk and Compliance Professional (CISRCP). To learn more, you may visit: https://www.risk-compliance-association.com/CISRCP_Distance_Learning_and_Certification.htm

A3. Certified Risk and Compliance Management Professional in Insurance and Reinsurance CRCMP(Re)I. To learn more, you may visit: https://www.risk-compliance-association.com/CRCMP_Re_I.htm

A4. Certified Cyber (Governance Risk and Compliance) Professional CC(GRC)P. To learn more, you may visit: https://www.risk-compliance-association.com/CC_GRC_P_Distance_Learning_and_Certification.htm

B. Instructor-led training.

The association develops and maintains four certification programs, and tailors presentations and training programs for directors, executive managers, risk and compliance managers, internal and external auditors, data owners, process owners, consultants, suppliers, and service providers.

For instructor-led training, you may contact Lyn Spooner.

3. Is there any discount available for the distance learning programs?

Unfortunately, we do not offer any discount for the first program. We want to keep the cost of the programs so low for all members.

You have a $100 discount only after you purchase one of our programs. The discount applies to each additional program of the association.

For example, you can purchase the CRCMP program for $297, and then purchase the CISRCP program for $197 (instead of $297), and/or the CC(GRC)P program for $197 (instead of $297), and/or the CRCMP(Re)I program for $197 (instead of $297).

4. Why do you accept payments via PayPal only, for the distance learning programs?

There are important threats to data security in today's IT landscape. On top of that, new data protection regulations around the world put tough requirements on organisations that store “personally identifiable data”, including credit card information. These two factors could increase the cost of our programs dramatically.

We accept payments via PayPal for the distance learning programs, to minimize the cost of compliance and administration. PayPal keeps and protects your financial information, not us, so we can keep the cost of the program so low.

With PayPal you have some additional benefits. You can keep the program for 59 days to evaluate it, and if you do not like it, you can simply send us an email and ask for a full refund, no questions asked. We will refund your payment in less than 24 hours. PayPal offers this escrow service (an escrow generally refers to money held by a third-party, PayPal, on behalf of the transacting parties). In this way, there is absolutely no risk for you.

If you do not have a PayPal account and you do not want to create one, somebody else with a PayPal account can also pay for you. After the payment, just let us know, and we will update the record.

5. Are your training and certification programs vendor neutral?

Yes. We do not promote any products or services, and we are 100% independent.

6. I want to learn more about the exam.

You can take the exam online in the comfort of your home or office, in all countries. You will be given 90 minutes to complete a 35-question multiple-choice exam. You must score 70% or higher.

We do not send sample questions. If you study the presentations, you can score 100%.

When you are ready to take the CRCMP exam, you must follow the steps: https://www.risk-compliance-association.com/CRCMP_Certification_Steps_1.pdf

When you are ready to take the CISRCP exam, you must follow the steps: https://www.risk-compliance-association.com/CISRCP_Certification_Steps_1.pdf

When you are ready to take the CRCMP(Re)I exam, you must follow the steps: https://www.risk-compliance-association.com/CRCMP_Re_I_Certification_Steps.pdf

When you are ready to take the CC(GRC)P exam, you must follow the steps: https://www.risk-compliance-association.com/CC_GRC_P_Certification_Steps_1.pdf

7. How comprehensive are the presentations? Are they just bullet points?

The presentations are not bullet points. They are effective and appropriate to study online or offline.

8. Do I need to buy books to pass the exam?

No. If you study the presentations, you can pass the exam. All the exam questions are clearly answered in the presentations. If you fail the first time, you must study more. Print the presentations and use Post-it to attach notes, to know where to find the answer to a question.

9. Is it an open book exam? Why?

Yes, it is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.

10. Do I have to take the exam soon after receiving the presentations?

No. You can take the exam from your office or home, any time in the future. Your account never expires.

11. Do I have to spend more money in the future to remain certified?

No. Your certificates never expire. They will be valid, without the need to spend money or to take another exam in the future.

12. Ok, the certificates never expire, but things change.

Recertification would be a great recurring revenue stream for the association, but it would also be a recurring expense for our members. We resisted the temptation to "introduce multiple recurring revenue streams to keep business flowing", as we were consulted. No recertification is needed for our programs.

Things change, and this is the reason you need to become (at no cost) a member of the association. Every Monday you can visit the "Reading Room" of the association and read our newsletter with updates, alerts, and opportunities, to stay current.

13. How many hours do I need to study to pass the exam?

You must study the presentations at least twice, to ensure you have learned the details. The average time needed is 32 hours for the CRCMP program, 26 hours for the CISRCP program, 35 hours for the CC(GRC)P program, and 34 hours for the CRCMP(Re)I program, but there are important differences.

14. Why should I get certified?

Firms and organizations hire and promote "fit and proper" professionals who can provide evidence that they are qualified. Employers need assurance that employees have the knowledge and skills needed to mitigate risks and accept responsibility. Supervisors and auditors ask for independent evidence that the process owners are qualified, and that the controls can operate as designed, because the persons responsible for these controls have the necessary knowledge and experience.

The marketplace is clearly demanding qualified professionals in risk and compliance management. Certified professionals enjoy industry recognition and have more and better job opportunities. It is important to get certified and to belong to professional associations. You prove that you are somebody who cares, learns, and belongs to a global community of professionals.

15. Why should I choose your certification programs?

We strongly believe that we offer very good value for money.

a. The all-inclusive cost of our programs is very low. There is no additional cost for each program, now or in the future, for any reason.

b. If you purchase a second program from the association, you have a $100 discount. The all-inclusive cost for your second (and each additional) program is $197.

c. There are 3 exam attempts per year that are included in the cost of each program, so you do not have to spend money again if you fail.

d. No recertification is required. Your certificates never expire.

e. You become a member of the association, you get certified, and you receive weekly updates, news, and alerts.