Security Risks: Key Risk Terms & Concepts

IT Security
  • 16 Videos | 1h 59m 21s
  • Includes Assessment
  • Earns a Badge
Familiarity with key terms and concepts associated with security risk enables security leaders to identify, evaluate, and prioritize security risks. In this course, you'll get familiar with the terminologies, activities, and concepts associated with a security risk management process. You'll start by discovering the interdependence between assets, vulnerabilities, threats, and risks. You'll then investigate how to assess risk probability, measure the impact created by it, and the difference between risk appetite and risk tolerance. Next, you'll examine the components, benefits, and stages of a risk management process. You'll also identify different methods of treating risk and the importance of implementing controls as a part of a risk-based approach. Lastly, you'll recognize the standards for risk management and the advantages of managing and assessing security risk.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    outline how risks are related to assets
    identify the similarities and differences between likelihood and probability assessment
    recognize the role of vulnerabilities in risks and the correlation between risk and threat
    outline risk probability, the impact generated by it, and how to measure it using a risk score
    describe risk severity and identify various risk security levels
    identify potential risks that may exist within an organization and differentiate between risk appetite and risk tolerance
    define the concept and advantages of a risk management process
  • recognize the importance of a risk management plan and identify its components
    describe the role of a risk register in managing risk and outline the elements of risks listed within it
    describe the features of different risk treatment methods
    recognize the importance of managing risk and implementing a risk-based approach
    outline the elements of the COBIT 5 framework and describe the ISO 31000 standard for risk management
    list the three key stages of a risk management process: risk identification, risk assessment, and risk management
    illustrate the importance of security risk assessment in preempting and preparing for risks, prioritizing risks, and identifying assets to be protected
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 28s
    UP NEXT
  • Playable
    2. 
    Relationship between Security Risks and Assets
    9m 14s
  • Locked
    3. 
    Likelihood versus Probability
    7m 15s
  • Locked
    4. 
    Vulnerabilities, Threats and Risks
    12m 49s
  • Locked
    5. 
    Risk Probability, Impact and Risk Score
    4m 27s
  • Locked
    6. 
    Elements of Risk Severity
    7m 14s
  • Locked
    7. 
    Risk Appetite versus Risk Tolerance
    3m 18s
  • Locked
    8. 
    Advantages of a Risk Management Process
    3m 57s
  • Locked
    9. 
    Components of a Risk Management Plan
    8m 59s
  • Locked
    10. 
    Risk Management Using a Risk Register
    12m 3s
  • Locked
    11. 
    Risk Treatment Methods
    7m 4s
  • Locked
    12. 
    Importance of Risk Management
    9m 38s
  • Locked
    13. 
    Frameworks and Standards for Risk Management
    9m 55s
  • Locked
    14. 
    Stages in the Security Risk Management Process
    6m 26s
  • Locked
    15. 
    Security Risk Assessment
    6m 49s
  • Locked
    16. 
    Course Summary
    1m 45s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.