Managing Enterprise InfoSec Risks & Risk Tolerance

InfoSec 2023    |    Beginner
  • 15 videos | 1h 44m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify details of information security risk
    Differentiate between risks, threats, and vulnerabilities
    Outline the history of information security
    List common threats to it systems and data, including hardware, software, malware, phishing, and human error
    Outline common criminal threats to it systems, such as hackers, staff, breaches, theft, and fraud
    Identify risks enabled by natural disasters, such as fires, tornados, and flooding
    State how to identify risks to it systems or information
  • Recognize the importance of having a structured process in place to identify, assess, and mitigate risk
    Differentiate between quantitative and qualitative risk analysis
    Outline common roles and responsibilities for dealing with risk, including those of senior management and risk assessors
    Name common risk assessment tools and outline how they can be used for risk assessments
    Outline how penetration testing can be used to evaluate it security and identify vulnerabilities
    Identify vulnerability assessment tools and how they can be used to scan for known security flaws or bugs
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 18s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 10m 57s
    After completing this video, you will be able to identify details of information security risk. FREE ACCESS
  • Locked
    3.  Risk, Threats, and Vulnerabilities
    10m 2s
    Learn how to differentiate between risks, threats, and vulnerabilities. FREE ACCESS
  • Locked
    4.  The History of Information Security
    7m 5s
    Upon completion of this video, you will be able to outline the history of information security. FREE ACCESS
  • Locked
    5.  Information Technology Risks
    8m 11s
    In this video, we will list common threats to IT systems and data, including hardware, software, malware, phishing, and human error. FREE ACCESS
  • Locked
    6.  Criminal Threats
    8m 21s
    After completing this video, you will be able to outline common criminal threats to IT systems, such as hackers, staff, breaches, theft, and fraud. FREE ACCESS
  • Locked
    7.  Natural Disasters
    6m 45s
    Upon completion of this video, you will be able to identify risks enabled by natural disasters, such as fires, tornados, and flooding. FREE ACCESS
  • Locked
    8.  Security Risk Identification
    7m 49s
    In this video, we will state how to identify risks to IT systems or information. FREE ACCESS
  • Locked
    9.  Manage Security Risks
    6m 9s
    In this video, recognize the importance of having a structured process in place to identify, assess, and mitigate risk. FREE ACCESS
  • Locked
    10.  Quantitative vs. Qualitative Risk Analysis
    5m 50s
    Discover how to differentiate between quantitative and qualitative risk analysis. FREE ACCESS
  • Locked
    11.  Risk Roles and Responsibilities
    7m 14s
    After completing this video, you will be able to outline common roles and responsibilities for dealing with risk, including those of senior management and risk assessors. FREE ACCESS
  • Locked
    12.  Risk Assessment Tools
    8m 4s
    In this video, we will name common risk assessment tools and outline how they can be used for risk assessments. FREE ACCESS
  • Locked
    13.  Penetration Testing Assessments
    8m 48s
    Upon completion of this video, you will be able to outline how penetration testing can be used to evaluate IT security and identify vulnerabilities. FREE ACCESS
  • Locked
    14.  Vulnerability Assessment Tools
    6m 41s
    In this video, identify vulnerability assessment tools and how they can be used to scan for known security flaws or bugs. FREE ACCESS
  • Locked
    15.  Course Summary
    47s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 219 users Rating 4.6 of 219 users (219)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.2 of 25 users Rating 4.2 of 25 users (25)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 110 users Rating 4.5 of 110 users (110)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)