Managing Enterprise InfoSec Risks & Risk Tolerance
InfoSec 2023
| Beginner
- 15 videos | 1h 44m 3s
- Includes Assessment
- Earns a Badge
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify details of information security riskDifferentiate between risks, threats, and vulnerabilitiesOutline the history of information securityList common threats to it systems and data, including hardware, software, malware, phishing, and human errorOutline common criminal threats to it systems, such as hackers, staff, breaches, theft, and fraudIdentify risks enabled by natural disasters, such as fires, tornados, and floodingState how to identify risks to it systems or information
-
Recognize the importance of having a structured process in place to identify, assess, and mitigate riskDifferentiate between quantitative and qualitative risk analysisOutline common roles and responsibilities for dealing with risk, including those of senior management and risk assessorsName common risk assessment tools and outline how they can be used for risk assessmentsOutline how penetration testing can be used to evaluate it security and identify vulnerabilitiesIdentify vulnerability assessment tools and how they can be used to scan for known security flaws or bugsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 18sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
10m 57sAfter completing this video, you will be able to identify details of information security risk. FREE ACCESS
-
10m 2sLearn how to differentiate between risks, threats, and vulnerabilities. FREE ACCESS
-
7m 5sUpon completion of this video, you will be able to outline the history of information security. FREE ACCESS
-
8m 11sIn this video, we will list common threats to IT systems and data, including hardware, software, malware, phishing, and human error. FREE ACCESS
-
8m 21sAfter completing this video, you will be able to outline common criminal threats to IT systems, such as hackers, staff, breaches, theft, and fraud. FREE ACCESS
-
6m 45sUpon completion of this video, you will be able to identify risks enabled by natural disasters, such as fires, tornados, and flooding. FREE ACCESS
-
7m 49sIn this video, we will state how to identify risks to IT systems or information. FREE ACCESS
-
6m 9sIn this video, recognize the importance of having a structured process in place to identify, assess, and mitigate risk. FREE ACCESS
-
5m 50sDiscover how to differentiate between quantitative and qualitative risk analysis. FREE ACCESS
-
7m 14sAfter completing this video, you will be able to outline common roles and responsibilities for dealing with risk, including those of senior management and risk assessors. FREE ACCESS
-
8m 4sIn this video, we will name common risk assessment tools and outline how they can be used for risk assessments. FREE ACCESS
-
8m 48sUpon completion of this video, you will be able to outline how penetration testing can be used to evaluate IT security and identify vulnerabilities. FREE ACCESS
-
6m 41sIn this video, identify vulnerability assessment tools and how they can be used to scan for known security flaws or bugs. FREE ACCESS
-
47sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.