Risk Analysis: Security Risk Management
IT Security
| Intermediate
- 14 videos | 38m 15s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners can explore security risk management concepts and discover how to assess, categorize, monitor, and respond to organizational risks. Examine key terms such as threats, vulnerabilities, impacts, and risks, and the steps involved in the National Institute of Standard and Technology (NIST), risk management framework (RMF). Begin by learning how risk relates to information systems, and look at the concepts of managing risks, differentiating between threats, vulnerabilities, impacts, and risks. Examine the first step of the NIST RMF, categorizing risk, and then the second RMF step, selecting security controls. Next, observe the third step, implementing security controls; the fourth step, assessing security control effectiveness; the fifth step, examining risk, and output of security controls assessment to determine whether or not the risk is acceptable; and the last step, monitoring controls. Recognize benefits of a control-focused risk management approach; the benefits of an event-focused risk management approach; and risk communication. Finally, explore risk response and remediation, and differentiating between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring risk.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe risk as it relates to information systemsDifferentiate between threats, vulnerabilities, impacts, and risksDescribe the first step of the nist risk management framework, categorizing riskDescribe the second step in the rmf, selecting security controlsDescribe the third step in the rmf, implementing security controlsDescribe forth step in the rmf, assessing security control effectiveness
-
Describe the fifth step in the rmf, examining output of security controls assessment to determine whether or not the risk is acceptableDescribe the last step in the rmf, monitoring controlsRecognize the benefits of a control focused risk management approachRecognize the benefits of an event focused risk management approachList keys to presenting risk to shareholders, such as soliciting stakeholder inputDifferentiate between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring riskSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 22s
-
4m 45sUpon completion of this video, you will be able to describe how risk relates to information systems. FREE ACCESS
-
2m 21sIn this video, learn how to differentiate between threats, vulnerabilities, impacts, and risks. FREE ACCESS
-
2m 39sUpon completion of this video, you will be able to describe the first step of the NIST risk management framework, which is categorizing risk. FREE ACCESS
-
4m 36sUpon completion of this video, you will be able to describe the second step in the RMF, which is selecting security controls. FREE ACCESS
-
2m 44sUpon completion of this video, you will be able to describe the third step in the Risk Management Framework, implementing security controls. FREE ACCESS
-
2m 57sUpon completion of this video, you will be able to describe the fourth step in the RMF, assessing security control effectiveness. FREE ACCESS
-
1m 33sAfter completing this video, you will be able to describe the fifth step in the RMF, which is examining the output of security controls assessment to determine whether or not the risk is acceptable. FREE ACCESS
-
1m 50sAfter completing this video, you will be able to describe the last step in the RMF, monitoring. FREE ACCESS
-
1m 23sUpon completion of this video, you will be able to recognize the benefits of a risk management approach that focuses on control. FREE ACCESS
-
1m 24sUpon completion of this video, you will be able to recognize the benefits of a risk management approach that focuses on events. FREE ACCESS
-
3m 1sUpon completion of this video, you will be able to list keys to presenting risk to shareholders, such as soliciting stakeholder input. FREE ACCESS
-
5m 41sFind out how to differentiate between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring risk. FREE ACCESS
-
56s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.