Ahmed Elhefny is a seasoned expert in governance, risk, and compliance (GRC), with over a decade of hands-on experience in the industry. His comprehensive understanding of GRC principles and practices has been honed through years of implementing robust risk management frameworks and compliance strategies in high-stakes environments. His expertise extends across multiple sectors, allowing him to bring knowledge and industry-specific insights to his teaching.
As the author of the "Ultimate GRC | Governance, Risk, Compliance Training," Ahmed is deeply dedicated to preparing professionals to navigate the complex landscape of GRC with confidence and competence. His passion for the field is evident in the dynamic and engaging curriculum he has designed, which reflects the latest trends and technologies shaping the industry. Ahmed's commitment to empowering students with practical skills and a thorough understanding of GRC ensures they are well-equipped to excel in the evolving business landscape of 2025 and beyond.
Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- The Security Objective (7:15)
- What is the Governance, Risk and Compliance? (5:08)
- Information Security roles and GRC (4:03)
- Key Security Terminologies (8:41)
- Adversaries and Threat Actors (4:58)
- Security vulnerabilities (5:15)
- What is Malware? (11:33)
- The Cyber Security Attacks (4:12)
- Understand Web Application Attacks (9:31)
- Social Engineering (10:02)
- IT Infrastructure (6:07)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Policies (4:46)
- Example - Acceptable Use - Physical Security - Clear Desk (7:21)
- Example - Internet Access, Email Security - Remote Access Policies (7:07)
- Example - Network, Wireless & BYOD Policies (7:04)
- Example - Data Protection, Encryption, Classification Policies (8:19)
- User Account, Password and Access Control Policies (7:55)
- Artificial Intelligence Usage Policy (5:36)
- Standards (4:18)
- Procedures and Guidelines (4:24)
- Review Policies, Standards and Procedures (6:47)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Information System Auditing overview (5:29)
- Types of Audits (4:59)
- Audit Committee (4:26)
- Audit Planning (16:09)
- Audit Execution (4:44)
- Evidence Collection during Auditing (5:37)
- Evaluation of Controls during the Audit (5:42)
- Using Sampling in Audit Engagement (7:01)
- Audit Reporting and Documentation (5:52)
- SSAE (7:41)
- SOC Audit and Understand SOC Reports (5:11)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- # Securing Endpoints (14:50)
- # Endpoint Security Software & Endpoint Protection Platform (13:12)
- Data Lifecycle (3:45)
- Roles in Data and Assets Protection (4:49)
- Data Classification (12:12)
- Data Security Measures and Controls (6:47)
- DLP (7:37)
- DRM (8:13)
- Data Destruction (4:39)
- Physical Access Control Security Measures (6:00)
Available in
days
days
after you enroll
- The Process of Acquiring New technology (6:05)
- Feasibility Analysis and Business Case (4:44)
- Software Development Process (12:08)
- Software Development Methodologies (7:35)
- Software and Information System Testing (12:43)
- Secure Coding and Software Development (8:45)
- DevOps (6:37)
- DevSecOps (7:11)
- Software Types and Licenses (8:56)
- Intellectual Property (3:24)
Available in
days
days
after you enroll
- Software and System Implementation & PIR (10:39)
- Vulnerability Assessment and Patch Management (4:54)
- Penetration Testing (10:06)
- The Bug Bounty Program (5:23)
- Release Management (7:15)
- Change Management Process (11:05)
- Configuration Management (7:15)
- IT Assets Management (6:51)
- IT Management and ITIL Framework Overview (8:40)
- Control Objective of IT - COBIT (6:11)
Available in
days
days
after you enroll
- # Incident Management Process (10:26)
- # Responding to Incidents (15:37)
- # Business Impact Assessment (17:21)
- # Understand RTO and RPO (12:35)
- # Recovery Strategies (5:47)
- # BCP and DRP Testing and Evaluation (6:19)
- Backup and Recovery (10:47)
- # Storage Redundancy and RAID (11:03)
- # Network Redundancy (9:30)
FAQs
What can I expect to learn from this course?
This course is a comprehensive introduction to Governance, Risk, and Compliance (GRC) in cyber security. You’ll gain valuable insights and practical skills to bridge the gap between business and technology, making you a standout professional in the field.
Do I need prior experience or certifications to take this course?
Not at all! This course is designed for absolute beginners and professionals alike. Whether you’re just starting your career or transitioning into GRC, this course provides everything you need without requiring technical
Who is this course best suited for?
This course is perfect for:
Anyone looking to break into cyber security through non-technical roles.
Technical professionals eager to broaden their understanding of GRC.
Cyber security specialists aspiring to leadership or architecture roles where GRC expertise is essential.
Will I receive a certification upon completing the course?
Yes, absolutely! Upon completing the course, you’ll receive a signed, official certificate to showcase your expertise. It’s a valuable addition to your resume and LinkedIn profile.
Is there a refund policy?
Yes, we offer refunds within 14 days of purchase. If you’re unsatisfied with the course for any reason, simply contact us at [email protected], and we’ll assist you with the refund process.
Check your inbox to confirm your subscription