CISSP: Risk Management

Expert
  • 7 videos | 41m 30s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 436 users Rating 4.4 of 436 users (436)
What roles do humna resources and legal departments play in ensuring that an enterprise is run securely? During this course, you will explore the governance, compliance, and business continuity planning domains for the enterprise security practitioner and engineer. You will observe how these departments must work closely with the security policy steering committee to enforce personnel security policies and procedures. See how to apply risk assessment and analysis techniques; study how to respond to risks, including measurement and monitoring. Discover how to implement threat modeling concepts and methodologies. Learn to apply risk-based management concepts to the supply chain. Also learn to build and maintain security training programs. Finally, as a review exercise, you will examine various IT security controls.

WHAT YOU WILL LEARN

  • Enforce personnel security policies and procedures
    Apply risk assessment and analysis techniques
    Respond to risks, including measurement and monitoring
    Implement threat modeling concepts and methodologies
  • Apply risk-based management concepts to the supply chain
    Establish and maintain a security awareness and training program
    Describe various it security controls

IN THIS COURSE

  • Locked
    1.  Personnel Security Policies
    5m 53s
    In this video, you will learn how to enforce personnel security policies and procedures. FREE ACCESS
  • Locked
    2.  Risk Assessment and Analysis
    14m 22s
    In this video, you will learn how to apply risk assessment and analysis techniques. FREE ACCESS
  • Locked
    3.  Risk Response, Measurement, and Monitoring
    7m 35s
    In this video, you will learn how to respond to risks, including measurement and monitoring. FREE ACCESS
  • Locked
    4.  Threat Modeling
    3m 37s
    Learn how to implement threat modeling concepts and methodologies. FREE ACCESS
  • Locked
    5.  Risk-based Supply Chain Management
    2m 9s
    In this video, learn how to apply risk-based management concepts to your supply chain. FREE ACCESS
  • Locked
    6.  Security Awareness
    6m
    During this video, you will learn how to establish and maintain a security awareness and training program. FREE ACCESS
  • Locked
    7.  Exercise: Describing Controls for IT Security
    1m 53s
    Upon completion of this video, you will be able to describe various IT security controls. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 84 users Rating 4.5 of 84 users (84)
Rating 4.6 of 66 users Rating 4.6 of 66 users (66)
Rating 4.5 of 245 users Rating 4.5 of 245 users (245)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 356 users Rating 4.5 of 356 users (356)
Rating 4.6 of 336 users Rating 4.6 of 336 users (336)
Rating 4.6 of 498 users Rating 4.6 of 498 users (498)