<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=325921436538399&amp;ev=PageView&amp;noscript=1">
Skip to the main content.

Create an account on our custom learning platform, Foundry™, to access our free and premium content.

Create Free Account


New call-to-action

Compliance Fundamentals V2

Part three of our three-part Cybersecurity Foundations training pathway.




In this course you'll...

  • Quantify and Qualify Risk: as it pertains to cyber risk and its significance within the cybersecurity landscape.

  • Dive into GRC: working with frameworks that aid organizations in identifying, assessing, and mitigating risks effectively.

  • Work with Industry Policies: to recognize the crucial role of comprehensive asset inventory and configuration management in strengthening cybersecurity protocols.

  • Learn Practical Techniques: for identifying, prioritizing, and remedying vulnerabilities to bolster the organization's overall security posture.

Compliance Fundamentals Curriculum

Check out the syllabus here: All Fundamentals Syllabus and some screenshots from labs you'll complete below:

visualize maturity level data-enhance-1.5x

Learning how to visualize cyber risk is valuable for gaining insights into complex threats, facilitating informed decision-making, and effectively communicating risk assessments in cybersecurity.

implement best practice configurations-enhance-1.5x
Implementing best practice security configurations is essential for mitigating vulnerabilities, reducing the attack surface, and enhancing overall cybersecurity resilience.
learn about maturity levels-enhance-1.5x

Qualifying and quantifying cyber risk is essential for understanding the potential impact of threats, prioritizing risk mitigation efforts, and making informed decisions to protect organizational assets in cybersecurity.

categorize controls-enhance-1.5x
Learning to classify and attribute security controls within a security program is vital for ensuring comprehensive protection, aligning defenses with organizational objectives, and optimizing resource allocation in cybersecurity.

Compliance Fundamentals is part of our Cybersecurity Foundations training pathway.

Because each course builds off its predecessor, we strongly recommend completing the Cybersecurity Foundations training pathway in this order:

  1. IT Fundamentals 

  2. Cybersecurity Fundamentals

  3. Compliance Fundamentals (You are here!)

Check out our other courses below.