CISM 2022: Assessing Risk

CISM    |    Intermediate
  • 8 videos | 45m 39s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 12 users Rating 4.7 of 12 users (12)
Assessing risk is a crucial activity that enables organizations to evaluate risk exposure for business processes and assets. In this course, you will begin by exploring how to conduct vulnerability assessments and how the results can shed light on security control deficiencies. Next, you will learn how to perform a network vulnerability assessment and review the results, followed by scanning a web application for web app-specific vulnerabilities. You will discover how to conduct a gap analysis to determine the current security posture compared to a desired security posture. Then, you will explore the important aspects of when and how to run penetration tests. Lastly, you will see how to configure Microsoft Azure Policy assignments to determine cloud resource configuration compliance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how vulnerability assessments can be used to assess risk
    Use the free nessus tool to execute a vulnerability scan
    Use owasp zap to scan a web site for vulnerabilities
  • Recognize how gap analysis results serve as input for information security strategies
    Recognize how penetration testing provides value to the security program
    Use azure policy to view cloud resource compliance
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 10s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 54s
    After completing this video, you will be able to recognize how vulnerability assessments can be used to assess risk. FREE ACCESS
  • Locked
    3.  Conducting a Network Vulnerability Assessment
    7m 26s
    Find out how to use the free Nessus tool to execute a vulnerability scan. FREE ACCESS
  • Locked
    4.  Scanning a Web Application For Vulnerabilities
    7m 53s
    Learn how to use OWASP ZAP to scan a web site for vulnerabilities. FREE ACCESS
  • Locked
    5.  Perform a Gap Analysis
    7m 23s
    Upon completion of this video, you will be able to recognize how gap analysis results serve as input for information security strategies. FREE ACCESS
  • Locked
    6.  Penetration Testing
    7m 8s
    After completing this video, you will be able to recognize how penetration testing provides value to the security program. FREE ACCESS
  • Locked
    7.  Viewing Cloud Resource Security Compliance
    6m 57s
    Discover how to use Azure Policy to view cloud resource compliance. FREE ACCESS
  • Locked
    8.  Course Summary
    47s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.5 of 84 users Rating 4.5 of 84 users (84)
Rating 4.9 of 10 users Rating 4.9 of 10 users (10)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)