Risk Analysis: Security Risk Management

IT Security    |    Intermediate
  • 14 videos | 38m 15s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 242 users Rating 4.7 of 242 users (242)
In this 14-video course, learners can explore security risk management concepts and discover how to assess, categorize, monitor, and respond to organizational risks. Examine key terms such as threats, vulnerabilities, impacts, and risks, and the steps involved in the National Institute of Standard and Technology (NIST), risk management framework (RMF). Begin by learning how risk relates to information systems, and look at the concepts of managing risks, differentiating between threats, vulnerabilities, impacts, and risks. Examine the first step of the NIST RMF, categorizing risk, and then the second RMF step, selecting security controls. Next, observe the third step, implementing security controls; the fourth step, assessing security control effectiveness; the fifth step, examining risk, and output of security controls assessment to determine whether or not the risk is acceptable; and the last step, monitoring controls. Recognize benefits of a control-focused risk management approach; the benefits of an event-focused risk management approach; and risk communication. Finally, explore risk response and remediation, and differentiating between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring risk.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe risk as it relates to information systems
    Differentiate between threats, vulnerabilities, impacts, and risks
    Describe the first step of the nist risk management framework, categorizing risk
    Describe the second step in the rmf, selecting security controls
    Describe the third step in the rmf, implementing security controls
    Describe forth step in the rmf, assessing security control effectiveness
  • Describe the fifth step in the rmf, examining output of security controls assessment to determine whether or not the risk is acceptable
    Describe the last step in the rmf, monitoring controls
    Recognize the benefits of a control focused risk management approach
    Recognize the benefits of an event focused risk management approach
    List keys to presenting risk to shareholders, such as soliciting stakeholder input
    Differentiate between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring risk
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 22s
  • 4m 45s
    Upon completion of this video, you will be able to describe how risk relates to information systems. FREE ACCESS
  • Locked
    3.  Risk Management Concepts
    2m 21s
    In this video, learn how to differentiate between threats, vulnerabilities, impacts, and risks. FREE ACCESS
  • Locked
    4.  Categorizing Risk
    2m 39s
    Upon completion of this video, you will be able to describe the first step of the NIST risk management framework, which is categorizing risk. FREE ACCESS
  • Locked
    5.  Selecting Security Controls
    4m 36s
    Upon completion of this video, you will be able to describe the second step in the RMF, which is selecting security controls. FREE ACCESS
  • Locked
    6.  Implementing Security Controls
    2m 44s
    Upon completion of this video, you will be able to describe the third step in the Risk Management Framework, implementing security controls. FREE ACCESS
  • Locked
    7.  Assessing Security Controls
    2m 57s
    Upon completion of this video, you will be able to describe the fourth step in the RMF, assessing security control effectiveness. FREE ACCESS
  • Locked
    8.  Examining Risk
    1m 33s
    After completing this video, you will be able to describe the fifth step in the RMF, which is examining the output of security controls assessment to determine whether or not the risk is acceptable. FREE ACCESS
  • Locked
    9.  Monitoring Controls
    1m 50s
    After completing this video, you will be able to describe the last step in the RMF, monitoring. FREE ACCESS
  • Locked
    10.  Control Focused Risk Management
    1m 23s
    Upon completion of this video, you will be able to recognize the benefits of a risk management approach that focuses on control. FREE ACCESS
  • Locked
    11.  Event Focused Risk Management
    1m 24s
    Upon completion of this video, you will be able to recognize the benefits of a risk management approach that focuses on events. FREE ACCESS
  • Locked
    12.  Risk Communication
    3m 1s
    Upon completion of this video, you will be able to list keys to presenting risk to shareholders, such as soliciting stakeholder input. FREE ACCESS
  • Locked
    13.  Risk Response and Remediation
    5m 41s
    Find out how to differentiate between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring risk. FREE ACCESS
  • Locked
    14.  Course Summary
    56s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 219 users Rating 4.6 of 219 users (219)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 161 users Rating 4.5 of 161 users (161)
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Rating 4.4 of 94 users Rating 4.4 of 94 users (94)