Career Path

GRC Analyst

Career Path

Every successful cybersecurity program requires judicious risk management and informed oversight. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as a GRC Analyst or in any role that involves managing governance, risk, and compliance. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Path Releasing Q3 2025
Full access included with 
Cybrary Insider Pro
 and 
Teams

16

H

7

M
Time

Intermediate

i
Lorem Ipsum is simply dummy text
Experience Level

20000

XP

1

i

Lorem Ipsum is simply dummy text
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this Career Path

Effective Leadership and Management is critical to any security-related function. Cybrary’s Leadership and Management Career Path will equip you with essential leadership knowledge and hands-on skills. Over the course of 20+ courses, you will learn Leadership and Management Fundamentals, Soft Skills, Leadership Principles, Cybersecurity Leadership, and Strategic Leadership. 

Completing this career path and the associated Assessments will prepare you for pursuing a career as a leader or manager for IT and cybersecurity-related functions.

Read More

Skills you'll gain

  • Cybersecurity leadership and management fundamentals
  • Soft skills
  • Leadership principles
  • Cybersecurity leadership

Path Outline

Collection Outline

Coming Soon

The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.

Start Learning for Free
1

Learn

Learn core concepts and get hands-on with key skills.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the basics of governance. You will learn about accountability, transparency and oversight in GRC, as well as the distinctions between governance and management.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the foundations of cybersecurity program management. You will learn about cybersecurity roles, teams, and structures, program planning and budgeting as well as supply chain and third-party cybersecurity.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the hierarchy of policies, standards, procedures. You will also learn about lifecycle management.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to security controls. You will learn about control frameworks and classifications, how to implement technical security controls as well as monitoring and metrics for controls.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the basics of security auditing. You will learn about planning and scoping an audit, executing audit fieldwork as well as analyzing findings and reporting.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the basics of compliance. You will learn about roles and responsibilities, compliance program structure and maturity models, as well as evidence, documentation and reporting.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to General Data Protection Regulation (GDPR) Compliance. You will learn about data subject rights, lawful bases and consent, data controllers and processors as well as breach notifications and enforcement.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to Health Insurance Portability and Accountability Act (HIPAA) Compliance. You will learn about the privacy, security, and breach notification rules as well as compliance and enforcement.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to PCI DSS, or the Payment Card Industry Data Security Standard. You will learn about the core requirements, assessment process, and how to maintain compliance.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to Federal Information Security Modernization Act (FISMA) Compliance. You will learn about the NIST Risk Management Framework (RMF), FISMA reporting and metrics, roles and responsibilities, as well as continuous monitoring and maturity.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to ISO/IEC 27001 Compliance. You will learn about risk assessment and treatment, as well as certification and continuous improvement.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to compliance for the Gramm-Leach-Bliley Act (GLBA). You will learn about privacy rule requirements, safeguards rule implementation, compliance roles and training, as well as audit and enforcement.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to Cybersecurity Maturity Model Certification (CMMC) Compliance. You will learn about the CMMC domains and practices, the assessment and certification, how to maintain compliance as well as how to integrate CMMC with GRC.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the basics of risk management. You will learn about roles and responsibilities, the risk management lifecycle, as well as how to measure and communicate risk.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the foundations of IT asset management. You will learn about building a complete asset inventory, criticality mapping and business value, asset ownership and accountability, as well as using inventories for risk decision making.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the purpose of a business impact analysis. You will learn about identifying business processes and dependencies, impact assessment and prioritization, as well as how to maintain and update the business impact analysis.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to risk assessments. You will learn how to conduct a risk assessment, qualitative and quantitative techniques, as well as how to integrate risk assessments with GRC.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Risk Profile
1220
XP
H
29
M

In this course, you will be introduced to risk profiles. You will learn how to define a risk profile, build an organizational risk profile, use the risk profile for decision-making, as well as how to report risk posture.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to vulnerabilities. You will learn about scanning and discovery, prioritization models, how to operationalize vulnerability management, as well as vulnerability governance.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Risk Mitigation
1220
XP
H
29
M

In this course, you will be introduced to mitigation strategies. You will learn about designing effective controls, implementing mitigation plans, monitoring and validating controls, as well as reporting mitigation progress.

2

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this challenge, you will review a case study about security controls and monitoring. You will consider the benefits of two approaches to overhauling a monitoring and control assurance program.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this challenge, you will review a case study about policies, standards & procedures. You will consider the benefits of two approaches to managing a compliance program.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE

In this challenge, you will review a case study about GDPR compliance & cross-border data transfers. You will consider the benefits of two approaches to reform the organization’s international data transfer practices.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE

In this challenge, you will review a case study about payment security and cardholder data mismanagement. You will consider the benefits of two approaches to reforming an existing PCI compliance program.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE

In this challenge, you will review a case study about third-party access. You will consider the benefits of real-time monitoring improvements or governance-driven oversight reforms.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE

In this challenge, you will review a case study about monitoring and governance. You will consider the benefits of two approaches to reform after a breach.

3

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Governance
1500
XP
H
30
M

Test your knowledge of Governance to identify strengths, gaps, and weaknesses in areas like program management, policies, standards, and procedures, controls and monitoring, and auditing. Measure your mastery of governance and advance your career with targeted course recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Compliance
1500
XP
H
30
M

Test your knowledge of Compliance to identify strengths, gaps, and weaknesses in areas like GDPR, HIPAA, PCI DSS, and more. Measure your mastery of compliance and advance your career with targeted course recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Risk Management
1500
XP
H
30
M

Test your knowledge of Risk Management to identify strengths, gaps, and weaknesses in areas like IT asset inventory & criticality mapping, business impact analysis, risk assessment and mitigation, and vulnerability prioritization. Measure your mastery of risk management and advance your career with targeted course recommendations.

4

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Instructors

Brian Rogalski
CEO of Hexcapes
Read Full Bio
Yesenia Yser
Engineering Manager, Security Research & Development at SoFL, Women in Tech Committee Member, University Outreach and STEM Instructor
Read Full Bio
Learn

Learn core concepts and get hands-on with key skills.

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

Frequently Asked Questions

No items found.