Security Risks: Performing Security Risk Assessments
IT Security
| Beginner
- 13 videos | 1h 35m 51s
- Includes Assessment
- Earns a Badge
The categorization of security risks is essential for effectively assessing and managing risk. In this course, you'll explore the assessment, classification, and prioritization of security risks. You'll begin by outlining the concept of risk assessment and the advantages of different risk assessment techniques. You'll also investigate the features of security assessment methods, such as vulnerability assessment and penetration testing, and discover how to assess security vulnerability. Moving on, you'll recognize the significance of risk categorization and how to update a risk register in Microsoft Excel using a four-quadrant risk classification matrix. Finally, you'll identify the purpose and process of risk prioritization, and the role of a probability-impact matrix in determining risk levels. You'll then investigate how to use the matrix to prioritize risks on a security risk register.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine the concept, advantages, and activities of risk assessmentList different types of risk assessmentDescribe the characteristics of qualitative risk assessment along with its advantages and disadvantagesDescribe the characteristics of quantitative risk assessment along with its advantages and disadvantagesIdentify vulnerability assessment and penetration testing as security assessment methodsDemonstrate security vulnerability assessment
-
Outline risk categorization using the four-quadrant risk classificationIllustrate how to update a risk register in microsoft excelRecognize the importance of prioritizing risksOutline the role of probability-impact matrix in prioritizing risksDemonstrate how to prioritize risks in a security risk register using a probability-impact matrixSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 43sIn this video, you’ll learn more about the course and your instructor. In this course, you’ll learn to define risk assessment and its types. You’ll also learn about the qualitative and quantitative risk assessment methods. You’ll also learn about the security assessment methods such as vulnerability assessment and penetration testing. The course will also cover risk categorization methods. Finally, you’ll learn about the risk register and methods used to update it. FREE ACCESS
-
14m 30sIn this video, you’ll learn more about risk assessment. You’ll learn what it is and the importance of it. You’ll discover risk assessment is the validation of critical assets, their weaknesses, and their threats. Every organization must be aware of its assets. When there are assets, there are going to be threats related to them. What you need to figure out is what’s needed to mitigate these threats. FREE ACCESS
-
4m 59sIn this video, you’ll learn that risk assessment is essentially of two types, the qualitative method and the quantitative method. You’ll learn more about the characteristics of these risk assessment types. Both assess risks in different ways. You’ll discover there is no correct method to use, it simply depends on the organization. FREE ACCESS
-
11m 18sIn this video, you’ll learn more about qualitative risk assessment. You’ll learn it focuses on evaluating the value of assets and the impact of threats to these assets in different scenarios. This type of risk assessment doesn’t use the monetary value component of risk assessments. Instead, it takes a look at different scenarios, risk possibility scenarios, and ranks the threat seriousness using different grades such as low, medium, or high. FREE ACCESS
-
8m 13sIn this video, you’ll learn more about quantitative risk assessment. You’ll learn this is completely opposite of qualitative risk assessment. You’ll quantitative risk assessment is objective. It gives you objective-based results, and it is considered difficult to use because you need to do a lot of calculations to successfully complete this risk assessment. It uses a data-intensive and scientific approach. FREE ACCESS
-
9m 43sIn this video, you’ll learn there are two different kinds of security assessment methods. You’ll discover one is the vulnerability assessment and the second one is penetration testing. A vulnerability assessment finds the vulnerabilities within an operating system or within an application. Penetration testing also helps find vulnerabilities but it goes one step further. It exploits those vulnerabilities to figure out the amount of damage a vulnerability can cause. FREE ACCESS
-
11m 45sIn this video, you’ll watch a demo. You’ll see how to do a vulnerability scan. You’ll scan a vulnerable website. You’ll learn to use Kali Linux, which offers many vulnerability scanning applications. In this demo, you’ll use nikto. First, you’ll click on it and you’ll see the terminal window opens up. It will display the help file. This help file will provide you with several options. You’ll type in vulweb.com, and the vulnerability scanning starts. FREE ACCESS
-
7m 27sIn this video, you’ll learn more about risk. Risk can be classified into four different categories. These are known knowns, unknown knowns, unknown unknowns, and known unknowns. Each of these has a distinct definition, which you’ll delve into in this video. Depending on the type of risk you're dealing with, you’ll need to classify it into one of the categories. FREE ACCESS
-
5m 3sIn this video, you’ll learn more about updating the risk register. In this video, you’ll learn how to update the existing risk register you created in the Performing Security Risk Identification course. First, you’ll enter a new risk. You’ll enter a risk from a vulnerability scan that was performed on Kali Linux and found 1 warning. It also found 58 suggestions. FREE ACCESS
-
5m 40sIn this video, you’ll learn more about performing a risk prioritization. You’ll learn you need to find out which risks have high score values, which have medium score values, and which have low score values. You’ll discover this is the method that will help you define risk levels. You’ll learn you need to define critical risks first, and then move down to the least critical risks. FREE ACCESS
-
5m 38sIn this video, you’ll learn more about the probability-impact matrix. You’ll learn it will help you prioritize risk using quantitative risk assessment. This matrix puts a number against probability. Then, it puts a number against the impact. Next, you’ll multiply both of these numbers to get the risk score. This will help you identify critical risks that need immediate attention. Risks with a high-risk score are those that need immediate attention. FREE ACCESS
-
8m 49sIn this video, you’ll learn more about updating the risk register using probability-impact metrics. You’ll use the risk register from the video Creating a Security Risk Register in the course Performing Security Risk Identification. You’ll take that risk register and update it using probability-impact metrics. You’ll enter the risk scores based on the various risks and you’ll enter their probability and impact. Now you have a specific risk score for each. FREE ACCESS
-
1m 4sIn this video, you’ll summarize what you learned in the course. You learned basic concepts of risk assessments. You explored the introduction to risk assessment, types of risk assessment, the qualitative risk assessment method, the quantitative risk assessment method, and security assessment methods. You also learned about vulnerability assessment, risk classification, updating a risk register, risk prioritization, and probability-impact matrix. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.