Security Risks: Key Risk Terms & Concepts

IT Security    |    Beginner
  • 16 videos | 1h 52m 21s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 68 users Rating 4.4 of 68 users (68)
Familiarity with key terms and concepts associated with security risk enables security leaders to identify, evaluate, and prioritize security risks. In this course, you'll get familiar with the terminologies, activities, and concepts associated with a security risk management process. You'll start by discovering the interdependence between assets, vulnerabilities, threats, and risks. You'll then investigate how to assess risk probability, measure the impact created by it, and the difference between risk appetite and risk tolerance. Next, you'll examine the components, benefits, and stages of a risk management process. You'll also identify different methods of treating risk and the importance of implementing controls as a part of a risk-based approach. Lastly, you'll recognize the standards for risk management and the advantages of managing and assessing security risk.


  • Discover the key concepts covered in this course
    Outline how risks are related to assets
    Identify the similarities and differences between likelihood and probability assessment
    Recognize the role of vulnerabilities in risks and the correlation between risk and threat
    Outline risk probability, the impact generated by it, and how to measure it using a risk score
    Describe risk severity and identify various risk security levels
    Identify potential risks that may exist within an organization and differentiate between risk appetite and risk tolerance
    Define the concept and advantages of a risk management process
  • Recognize the importance of a risk management plan and identify its components
    Describe the role of a risk register in managing risk and outline the elements of risks listed within it
    Describe the features of different risk treatment methods
    Recognize the importance of managing risk and implementing a risk-based approach
    Outline the elements of the cobit 5 framework and describe the iso 31000 standard for risk management
    List the three key stages of a risk management process: risk identification, risk assessment, and risk management
    Illustrate the importance of security risk assessment in preempting and preparing for risks, prioritizing risks, and identifying assets to be protected
    Summarize the key concepts covered in this course


  • 1m 28s
    In this video, you’ll learn more about the instructor and the course. In this course, you will learn about the various key terms that are associated with risk and risk management process. These terms will help you understand the concepts that will be discussed later in the courses in this learning track. FREE ACCESS
  • 9m 14s
    In this video, you’ll review the different concepts relating to risk. You’ll talk about risk in your general life as well as risk in relation to assets. You’ll learn any key asset of an organization is prone to risks. You’ll discover any asset with a risk is known as a risk asset. You’ll also explore risk detection, and learn how to detect a threat rather than prevent it. FREE ACCESS
  • Locked
    3.  Likelihood versus Probability
    7m 15s
    In this video, you’ll learn more about the two key terms associated with risk, likelihood and probability. You’ll learn that likelihood gives you the impact in a qualitative manner, whereas probability gives you the impact in a quantitative manner. Probability is objective. You’ll look at specific examples of each. FREE ACCESS
  • Locked
    4.  Vulnerabilities, Threats and Risks
    12m 49s
    In this video, you’ll learn more about the correlation between risk and threat. You’ll review the fact that a risk occurs when a threat exploits the vulnerabilities. You’ll also review threats, which are incidents that harm an asset, such as an application or system. Finally, you’ll review the term vulnerability, which is a weakness that can be exploited by a threat. You’ll learn a risk is directly proportionate to the number of the vulnerabilities. FREE ACCESS
  • Locked
    5.  Risk Probability, Impact and Risk Score
    4m 27s
    In this video, you’ll learn more about risk probability. You’ll learn that risk probability is the likelihood of a risk occurring, which will generate an impact if the risk occurs. You’ll learn to use the risk score, which is probability multiplied by the impact. You’ll discover risk probability is measured in a quantitative manner. FREE ACCESS
  • Locked
    6.  Elements of Risk Severity
    7m 14s
    In this video, you’ll learn more about risk severity. You’ll learn risk severity simply refers to how critical a risk is. You’ll discover this is also known as the level of risk, and it determines the technical impact of a risk. A risk may have a low impact or risk may have a high impact. Depending on the level of impact, you have to decide the risk severity. You’ll learn that risk severity defines impact. FREE ACCESS
  • Locked
    7.  Risk Appetite versus Risk Tolerance
    3m 18s
    In this video, you’ll learn more about risk appetite and risk tolerance. You’ll learn that every organization has the ability or the capability to handle risks. You’ll discover organizations can tolerate some risks, mitigate some risks, and avoid some risks. In this video, you’ll look at a risk pyramid. The bottom layer encompasses the risks in an organization, then comes a layer of risk capacity, the risk tolerance, and then risk appetite. FREE ACCESS
  • Locked
    8.  Advantages of a Risk Management Process
    3m 57s
    In this video, you’ll learn more about the risk process for risk management. You’ll learn it’s critical for organizations to have a risk process in place. If they don’t have one, they won’t be able to handle risks within the organization. Without a risk process, organizations may not even know what kind of risks exist within their organization. You’ll learn a risk process can help stakeholders within organizations make timely decisions when handling risks. FREE ACCESS
  • Locked
    9.  Components of a Risk Management Plan
    8m 59s
    In this video, you’ll learn more about the risk management plan. You’ll learn it provides a structured approach for identifying, analyzing, and monitoring risks. A risk management plan provides the processes and the methods to help control risks. You’ll learn a risk management plan helps reduce the cost of future risks. You’ll discover a risk management plan is a necessary document for every organization, and is the starting point for the risk management process. FREE ACCESS
  • Locked
    10.  Risk Management Using a Risk Register
    12m 3s
    In this video, you’ll learn more about documenting risks. You’ll learn that a list of documented risks is called a risk register. The risk register is a centralized repository of risks used to assign severity levels to identified risks. You’ll learn that these identified risks are those that can impact the assets within an organization. You’ll discover risk registers can also be created for specific projects within an organization. FREE ACCESS
  • Locked
    11.  Risk Treatment Methods
    7m 4s
    In this video, you’ll learn more about identified risks. You’ll discover that once a risk is identified, it must be treated. A risk can be treated in different ways. You’ll learn a risk can be handled by simply transferring it, or you could mitigate the risk, or you could accept the risk. This video will look at different methods for treating risks. FREE ACCESS
  • Locked
    12.  Importance of Risk Management
    9m 38s
    In this video, you’ll learn more about the risk management process. You’ll learn why risk management is an important business practice that helps businesses identify, evaluate, track, and mitigate the risks that might be present in an existing environment. You’ll discover that risk management is practiced by organizations of all sizes. Smaller organizations tend to manage risk informally, while larger organizations do it in a formal way. FREE ACCESS
  • Locked
    13.  Frameworks and Standards for Risk Management
    9m 55s
    In this video, you’ll learn about frameworks that help manage risks. You’ll learn these frameworks help establish a risk management process within an organization. These frameworks include COBIT 5, which provides a risk management process known as APO12 Manage Risk. In this framework, you’ll collect and analyze data to come up with risks. After you’ve identified the risks, you’ll analyze them. Then, you’ll learn about the ISO 31000 framework which is dedicated to risk management. FREE ACCESS
  • Locked
    14.  Stages in the Security Risk Management Process
    6m 26s
    In this video, you’ll learn about the different steps in a risk management process. You’ll learn there is no right or wrong number of steps, it just depends on how your risk management process is defined. You’ll discover this could be a very brief process, with just only three steps: risk identification, risk assessment, and risk management. Here, you will walk through, and learn more about, each of these three steps. FREE ACCESS
  • Locked
    15.  Security Risk Assessment
    6m 49s
    In this video, you’ll learn about security risk assessment. You’ll discover this is a method of identifying risks within an organization. Before you identify the risks, you’ll first have to identify the assets that must be protected. You’ll learn that security risk assessment is typically required by the compliance standards or frameworks such as PCI-DSS, HIPAA, or FISMA. You’ll discover there are different compliance and standards that require you to complete a security risk assessment. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 45s
      In this video, you’ll summarize what you’ve learned in the course. You learned the key terms and concepts of risks. You learned about likelihood versus probability, security threat as a risk, risk probability and impact, and risk severity. You also discovered risk appetite versus risk tolerance, concept of risk process, concept of risk management plan, concept of risk register, risk treatment methods, and more. FREE ACCESS


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Rating 4.4 of 105 users Rating 4.4 of 105 users (105)
Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Rating 4.4 of 194 users Rating 4.4 of 194 users (194)


Rating 4.4 of 30 users Rating 4.4 of 30 users (30)
Rating 4.5 of 154 users Rating 4.5 of 154 users (154)
Rating 4.6 of 76 users Rating 4.6 of 76 users (76)