Third Party Risk Management (TPRM) Complete Course - Printable Version +- TehParadox - Online Sharing Community | Warez Forum (https://tehparadox.org) +-- Forum: Books & Education (https://tehparadox.org/forumdisplay.php?fid=26) +--- Forum: Courses & Tutorials (https://tehparadox.org/forumdisplay.php?fid=28) +--- Thread: Third Party Risk Management (TPRM) Complete Course (/showthread.php?tid=1038) |
Third Party Risk Management (TPRM) Complete Course - voska89 - 10-17-2024 Third Party Risk Management (TPRM) Complete Course Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 441.87 MB | Duration: 3h 24m Vendor Risk Management | TPRM Lifecycle | GRC | IT Audit What you'll learn Third Party Risk Management Third Party Risk Management Lifecycle Planning and preparation Selection and Due Diligence Contract Negotiation and Onboarding Incident Management and Response Termination and Offboarding Continuous Monitoring Requirements Laptop, Desktop required to view and participate in lessons Enthusiastic about learning about learning how to perform a Risk Assessment Description In today's interconnected world, third-party relationships are essential for business success. However, these relationships can also expose organizations to significant risks-cyber threats, data breaches, regulatory non-compliance, financial loss, operational disruptions and reputational damage.Introducing the comprehensive "Third Party Risk Management" course!Gain the expertise needed to effectively manage and mitigate the risks associated with third-party vendors and partners.What Will You Learn?Understanding Third Party Risk: Define and assess the different types of third-party risks, from financial to cybersecurity.The TPRM Lifecycle: Learn about the complete lifecycle of third-party risk management, including due diligence, contracting, performance tracking, risk monitoring, and offboarding.Vendor Due Diligence: Understand how to effectively perform due diligence when onboarding new third-party vendors.Incident Management & Response: Gain skills in developing incident response plans for third-party breaches and understand how to recover quickly.Regulatory Compliance: Master the key regulatory requirements related to third-party risks, including GDPR, CCPA, SOC 2, PCI DSS, and Sarbanes Oxley (SOX).TPRM Governance: Understand governance frameworks that align with the organization's risk appetite and tolerance.Risk Assessment Techniques: Learn how to evaluate third-party risks using industry-leading frameworks like NIST, ISO 27001, COSO ERM, and Shared Assessments SIG.Who Should Enroll:Students, IT Professionals, Starting or Changing career into ITAnyone interested in pursuing a career in Third Party Risk ManagementIT professionalsRisk AnalystIT Security AnalystIT Compliance AnalystCyber Security ProfessionalsIT AuditorsIT Control TestersInformation Security ProfessionalsDon't Miss Out - Enroll Today! Invest in your future and take your career to new heights with the Third-Party Risk Management Complete Course. Join thousands of satisfied students who have transformed their careers with our industry-leading training. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Understanding Third Party Risk Management (TPRM) Lecture 3 Types of Third Party Relationships Lecture 4 Benefits of Third Party Relationships Lecture 5 Challenges With Managing Third Party Relationships Lecture 6 Third Party Risks Lecture 7 Inherent Risks Lecture 8 Residual Risks Lecture 9 Udemy Review System Lecture 10 Resources and Recommendations Lecture 11 Types of Third Party Risks Section 2: Third Party Risk Management Program Lecture 12 TPRM Program Lecture 13 Governance & Third Party Risk Management Lecture 14 TPRM Risk Management Framework (RMF) Lecture 15 NIST Cybersecurity Framework (CSF) 2.0 Lecture 16 NIST Special Publication 800-53 Lecture 17 ISO27001 Framework Lecture 18 COSO Framework Lecture 19 SIG Questionnaire Lecture 20 Risk Appetite Lecture 21 TPRM Teams - Roles & Responsibilities I Lecture 22 TPRM Teams - Roles & Reponsibilities II Lecture 23 Regulatory Compliance Section 3: Planning & Scoping Lecture 24 Third Party Risk Management Lifecycle Lecture 25 Planning & Scoping Lecture 26 Identifying Potential Vendors Lecture 27 Request for Proposal (RFP) Lecture 28 Request for Information (RFI) Section 4: Selection & Due Diligence - Part 1 Lecture 29 Selection & Due Diligence Lecture 30 Criticality & Inherent Risk Lecture 31 Due Diligence Activities Lecture 32 Third Party Profile Lecture 33 Inherent Risk Questionnaire Lecture 34 Risk Assessment & Due Diligence Lecture 35 Risk Assessment Section 5: Selection & Due Diligence - Part 2 Lecture 36 Information Security Risk Assessment Lecture 37 Operational Risk Assessment Lecture 38 Human Resources Risk Assessment Lecture 39 Privacy & Data Protection Risk Assessment Lecture 40 Compliance Risk Assessment Lecture 41 Financial Risk Assessment Lecture 42 Vendor Risk Management Framework Lecture 43 Fourth Party Assessment Lecture 44 Risk Identification Lecture 45 Risk Treatment / Response Lecture 46 Risk Assessment Report Lecture 47 Service Organization Controls (SOC) Lecture 48 SOC Categories and Types Lecture 49 Understanding SOC Reports Lecture 50 Reviewing SOC Reports Section 6: Contract Management Lecture 51 Contract Management Lecture 52 Key Stakeholders in Contract Management Lecture 53 Negotiating Contract Terms Lecture 54 Contract Review and Approvals Lecture 55 Ongoing Contract Management Lecture 56 Key Components of Service Level Agreements (SLAs) Lecture 57 Key Steps When an SLA is Breach Section 7: Monitoring & Performance Management Lecture 58 Monitoring and Performance Tracking 1 Lecture 59 Monitoring and Performance Tracking 2 Lecture 60 Incidence Response Management 1 Lecture 61 Incidence Response Management 2 Section 8: Termination & Offboarding Lecture 62 Types of Contract Termination Lecture 63 Termination and Offboarding Process - Part 1 Lecture 64 Termination and Offboarding Process - Part 2 Lecture 65 Best Practices for Effective Termination and Offboarding Section 9: Continuous Improvement Lecture 66 Continuous Improvement Activities Lecture 67 Congratulations Students, Professionals, Starting or Changing career into IT,Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT Auditor, IT professionals Screenshots Say "Thank You" rapidgator.net: Code: https://rapidgator.net/file/7319075c8adda77aa8b02443d8fc9158/lbpsa.Third.Party.Risk.Management.TPRM.Complete.Course.rar.html ddownload.com: Code: https://ddownload.com/x7wppjgkwjwu/lbpsa.Third.Party.Risk.Management.TPRM.Complete.Course.rar |