Information Risk Management Part I
CISM
| Intermediate
- 10 videos | 53m 54s
- Includes Assessment
- Earns a Badge
Discover how to implement an effective information risk management strategy for your organization, including how to recognize information asset classification, ownership, and threats, vulnerabilities, and exposures.
WHAT YOU WILL LEARN
-
recognize information asset classificationassign ownership of assets and riskevaluate impacts of events on information assetsmonitor internal and external risk factorsrecognize information asset valuation methods
-
specify legal, regulatory, and organizational requirementsrecognize information security threat sourcesidentify events needing risk reassessmentdefine information threats, vulnerabilities, and exposuresdescribe what is involved with information risk management
IN THIS COURSE
-
1.The Information Asset Classification Model8m 14sUP NEXT
-
2.Assigning Ownership of Information Assets and Risk3m 9s
-
3.Evaluating Impacts of Events on Information Assets7m 4s
-
4.Monitoring Internal and External Risk Factors5m 17s
-
5.Recognizing Information Asset Valuation Methods5m 23s
-
6.Legal, Regulatory, and Organizational Requirements2m 22s
-
7.Recognizing Information Security Threat Sources7m
-
8.Identifying Events Needing Risk Reassessment8m 31s
-
9.Information Threats, Vulnerabilities, and Exposures4m 32s
-
10.Exercise: Define Information Risk Management2m 22s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.