CRISC 2023: Risk Case Studies

CRISC    |    Intermediate
  • 7 videos | 31m 40s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
The ability to effectively mitigate risk to levels acceptable to the organization is possible through risk management. Business leaders and technicians must apply risk management techniques to many levels of threats. In this course, I will begin with a risk management scenario related to a ransomware outbreak. I will then manage risk related customer data breaches, user account compromises, and Internet of Things (IoT) device usage. Lastly, I will apply risk management techniques to phishing scams. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Apply risk management techniques to a ransomware outbreak
    Apply risk management techniques to a custom data breach
    Apply risk management techniques to user account compromise threats
  • Apply risk management techniques to internet of things (iot) device usage
    Apply risk management techniques to phishing scams
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 50s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 19s
    In this video, we will apply risk management techniques to a ransomware outbreak. FREE ACCESS
  • Locked
    3.  Risk Scenario 2: Customer Data Breach
    6m 50s
    In this video, we will apply risk management techniques to a custom data breach. FREE ACCESS
  • Locked
    4.  Risk Scenario 3: User Account Compromise
    6m 30s
    In this video, we will apply risk management techniques to user account compromise threats. FREE ACCESS
  • Locked
    5.  Risk Scenario 4: Internet of Things (IoT) Device Usage in the Workplace
    6m 16s
    In this video, we will apply risk management techniques to Internet of Things (IoT) device usage. FREE ACCESS
  • Locked
    6.  Risk Scenario 5: Phishing and Scams
    5m 23s
    In this video, we will apply risk management techniques to phishing scams. FREE ACCESS
  • Locked
    7.  Course Summary
    33s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)