Security Risks: Performing Security Risk Identification
IT Security
| Beginner
- 9 videos | 57m 16s
- Includes Assessment
- Earns a Badge
Effective security risk management often begins with proper security risk identification. In this course, you'll examine various components of the risk identification process and different techniques used to identify risk. You'll begin by distinguishing between threat and risk. You'll then get familiar with other terminologies and concepts associated with risk identification. Moving on, you'll recognize the significance of risk identification in recognizing assets and services that are risk-prone. You'll also investigate different methods used to identify risk and best practices for the risk identification process. Later in the course, you'll outline common security-related risks and their impact on different components of an organization. Finally, you'll examine the features of a security risk register, its role in risk management, and how to create one in Microsoft Excel.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify the differences between threat and riskRecognize the purpose and importance of risk identificationOutline the risk identification process and recognize organizational components impacted by riskDistinguish between different methods used for risk identification
-
List the best practices used for risk identification and identify the benefits of the processRecognize the characteristics and functions of a risk registerDemonstrate the method to create a risk register in microsoft excelSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 46sIn this video, you’ll learn more about your instructor and the course. This course will focus on performing security risk identification. You’ll learn the difference between threat and risk as well as the concept of risk identification. You’ll learn about the risk identification process and the methods used for risk identification. You’ll also discover best practices for risk identification. FREE ACCESS
-
9m 54sIn this video, you’ll learn more about the concept of risk identification. You’ll learn how to differentiate between a risk and a threat. A risk is a situation that exposes an asset to some sort of harm or danger. You’ll discover risk is not always a negative, it can have a positive impact. FREE ACCESS
-
8m 44sIn this video, you’ll learn about risk identification. You’ll learn that risk identification is a method of finding, recognizing, and describing risks. Risk identification involves analyzing what kind of risk may happen or what kind of situations may have an impact on a particular project, team, or organization. You’ll learn that identifying risk allows you to limit that particular risk. FREE ACCESS
-
9m 4sIn this video, you’ll learn the risk identification process has three stages. These include risk recognition, risk acceptance, and risk definition. You’ll learn risk recognition is a method of recognizing a risk exists within a project or an organization. Next is risk acceptance. This is understanding what the risk is. Finally, risk definition is the stage where risk is fully understood and you know the possible solutions for that particular risk. FREE ACCESS
-
6m 49sIn this video, you’ll learn that the process of risk identification uses different methods. To begin with, you’ll learn about brainstorming, which is typically done in a meeting where ideas generate other ideas. Next, you’ll learn about checklist analysis, where organizations compile risks encountered on different projects. You’ll then look at the interviewing method and root cause analysis. You’ll learn that with root cause analysis, you’ll identify risks based on their root causes. FREE ACCESS
-
6m 44sIn this video, you’ll learn about the process of risk identification and its benefits. You’ll learn that risk identification gets the risk assessment process started. This process means you’re able to spot risks as early as possible. You’ll discover risk identification should be performed at the start of any project, but can be repeated at any time. You’ll learn that the earlier you complete the risk identification process, the sooner you're able to identify risks. FREE ACCESS
-
7m 47sIn this video, you’ll review the basic concept of risk register. This is a centralized repository of risk. You’ll look at the key features of a risk register, which is used as a management tool. This is where you’ll identify and list risks. You’ll learn that these change as the risks are re-assessed. You’ll also discover that the risk register is adaptable, and there should always be someone managing the risk register. FREE ACCESS
-
5m 3sIn this video, you’ll watch a demo. You’ll learn how to create a risk register. You’ll open a template labeled Risk Register. Following the onscreen directions, you will input the information needed to complete the risk register. FREE ACCESS
-
1m 26sIn this video, you’ll review what you’ve learned in the course. In this course, you learned the basic concepts of risk identification. You explored threats versus risks, risk identification, the risk identification process, methods used for risk identification. You also learned best practices for risk identification and the risk register. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.