Security Risks: Performing Security Risk Identification

IT Security
  • 9 Videos | 1h 46s
  • Includes Assessment
  • Earns a Badge
Effective security risk management often begins with proper security risk identification. In this course, you'll examine various components of the risk identification process and different techniques used to identify risk. You'll begin by distinguishing between threat and risk. You'll then get familiar with other terminologies and concepts associated with risk identification. Moving on, you'll recognize the significance of risk identification in recognizing assets and services that are risk-prone. You'll also investigate different methods used to identify risk and best practices for the risk identification process. Later in the course, you'll outline common security-related risks and their impact on different components of an organization. Finally, you'll examine the features of a security risk register, its role in risk management, and how to create one in Microsoft Excel.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify the differences between threat and risk
    recognize the purpose and importance of risk identification
    outline the risk identification process and recognize organizational components impacted by risk
    distinguish between different methods used for risk identification
  • list the best practices used for risk identification and identify the benefits of the process
    recognize the characteristics and functions of a risk register
    demonstrate the method to create a risk register in Microsoft Excel
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 46s
    UP NEXT
  • Playable
    2. 
    Relationship between Security Threat and Risk
    9m 54s
  • Locked
    3. 
    Importance of Security Risk Identification
    8m 44s
  • Locked
    4. 
    Security Risk Identification Process
    9m 4s
  • Locked
    5. 
    Methods Used for Security Risk Identification
    6m 49s
  • Locked
    6. 
    Best Practices for Security Risk Identification
    6m 44s
  • Locked
    7. 
    Characteristics of a Security Risk Register
    7m 47s
  • Locked
    8. 
    Creating a Security Risk Register
    5m 3s
  • Locked
    9. 
    Course Summary
    1m 26s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.