Security Risks: Performing Security Risk Assessments

IT Security    |    Beginner
  • 13 Videos | 1h 41m 21s
  • Includes Assessment
  • Earns a Badge
The categorization of security risks is essential for effectively assessing and managing risk. In this course, you'll explore the assessment, classification, and prioritization of security risks. You'll begin by outlining the concept of risk assessment and the advantages of different risk assessment techniques. You'll also investigate the features of security assessment methods, such as vulnerability assessment and penetration testing, and discover how to assess security vulnerability. Moving on, you'll recognize the significance of risk categorization and how to update a risk register in Microsoft Excel using a four-quadrant risk classification matrix. Finally, you'll identify the purpose and process of risk prioritization, and the role of a probability-impact matrix in determining risk levels. You'll then investigate how to use the matrix to prioritize risks on a security risk register.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define the concept, advantages, and activities of risk assessment
    list different types of risk assessment
    describe the characteristics of qualitative risk assessment along with its advantages and disadvantages
    describe the characteristics of quantitative risk assessment along with its advantages and disadvantages
    identify vulnerability assessment and penetration testing as security assessment methods
    demonstrate security vulnerability assessment
  • outline risk categorization using the four-quadrant risk classification
    illustrate how to update a risk register in Microsoft Excel
    recognize the importance of prioritizing risks
    outline the role of probability-impact matrix in prioritizing risks
    demonstrate how to prioritize risks in a security risk register using a probability-impact matrix
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 43s
    UP NEXT
  • Playable
    2. 
    Features and Benefits of Security Risk Assessment
    14m 30s
  • Locked
    3. 
    Types of Security Risk Assessment
    4m 59s
  • Locked
    4. 
    Characteristics of Qualitative Risk Assessment
    11m 18s
  • Locked
    5. 
    Characteristics of Quantitative Risk Assessment
    8m 13s
  • Locked
    6. 
    Security Risk Assessment Methods
    9m 43s
  • Locked
    7. 
    Assessing Security Vulnerability
    11m 45s
  • Locked
    8. 
    Categorizing Risk Using Four-quadrant Classification
    7m 27s
  • Locked
    9. 
    Updating a Security Risk Register in Microsoft Excel
    5m 3s
  • Locked
    10. 
    Security Risk Prioritization
    5m 40s
  • Locked
    11. 
    Probability-impact Matrix for Risk Prioritization
    5m 38s
  • Locked
    12. 
    Illustrating the Probability-impact Matrix
    8m 49s
  • Locked
    13. 
    Course Summary
    1m 4s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE