CISM 2022: Assessing Risk
CISM
| Intermediate
- 8 videos | 45m 39s
- Includes Assessment
- Earns a Badge
Assessing risk is a crucial activity that enables organizations to evaluate risk exposure for business processes and assets. In this course, you will begin by exploring how to conduct vulnerability assessments and how the results can shed light on security control deficiencies. Next, you will learn how to perform a network vulnerability assessment and review the results, followed by scanning a web application for web app-specific vulnerabilities. You will discover how to conduct a gap analysis to determine the current security posture compared to a desired security posture. Then, you will explore the important aspects of when and how to run penetration tests. Lastly, you will see how to configure Microsoft Azure Policy assignments to determine cloud resource configuration compliance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how vulnerability assessments can be used to assess riskUse the free nessus tool to execute a vulnerability scanUse owasp zap to scan a web site for vulnerabilities
-
Recognize how gap analysis results serve as input for information security strategiesRecognize how penetration testing provides value to the security programUse azure policy to view cloud resource complianceSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 10sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 54sAfter completing this video, you will be able to recognize how vulnerability assessments can be used to assess risk. FREE ACCESS
-
7m 26sFind out how to use the free Nessus tool to execute a vulnerability scan. FREE ACCESS
-
7m 53sLearn how to use OWASP ZAP to scan a web site for vulnerabilities. FREE ACCESS
-
7m 23sUpon completion of this video, you will be able to recognize how gap analysis results serve as input for information security strategies. FREE ACCESS
-
7m 8sAfter completing this video, you will be able to recognize how penetration testing provides value to the security program. FREE ACCESS
-
6m 57sDiscover how to use Azure Policy to view cloud resource compliance. FREE ACCESS
-
47sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.