Security Risks: Performing Security Risk Identification

IT Security    |    Beginner
  • 9 videos | 57m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 41 users Rating 4.6 of 41 users (41)
Effective security risk management often begins with proper security risk identification. In this course, you'll examine various components of the risk identification process and different techniques used to identify risk. You'll begin by distinguishing between threat and risk. You'll then get familiar with other terminologies and concepts associated with risk identification. Moving on, you'll recognize the significance of risk identification in recognizing assets and services that are risk-prone. You'll also investigate different methods used to identify risk and best practices for the risk identification process. Later in the course, you'll outline common security-related risks and their impact on different components of an organization. Finally, you'll examine the features of a security risk register, its role in risk management, and how to create one in Microsoft Excel.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify the differences between threat and risk
    Recognize the purpose and importance of risk identification
    Outline the risk identification process and recognize organizational components impacted by risk
    Distinguish between different methods used for risk identification
  • List the best practices used for risk identification and identify the benefits of the process
    Recognize the characteristics and functions of a risk register
    Demonstrate the method to create a risk register in microsoft excel
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 46s
    In this video, you’ll learn more about your instructor and the course. This course will focus on performing security risk identification. You’ll learn the difference between threat and risk as well as the concept of risk identification. You’ll learn about the risk identification process and the methods used for risk identification. You’ll also discover best practices for risk identification. FREE ACCESS
  • 9m 54s
    In this video, you’ll learn more about the concept of risk identification. You’ll learn how to differentiate between a risk and a threat. A risk is a situation that exposes an asset to some sort of harm or danger. You’ll discover risk is not always a negative, it can have a positive impact. FREE ACCESS
  • Locked
    3.  Importance of Security Risk Identification
    8m 44s
    In this video, you’ll learn about risk identification. You’ll learn that risk identification is a method of finding, recognizing, and describing risks. Risk identification involves analyzing what kind of risk may happen or what kind of situations may have an impact on a particular project, team, or organization. You’ll learn that identifying risk allows you to limit that particular risk. FREE ACCESS
  • Locked
    4.  Security Risk Identification Process
    9m 4s
    In this video, you’ll learn the risk identification process has three stages. These include risk recognition, risk acceptance, and risk definition. You’ll learn risk recognition is a method of recognizing a risk exists within a project or an organization. Next is risk acceptance. This is understanding what the risk is. Finally, risk definition is the stage where risk is fully understood and you know the possible solutions for that particular risk. FREE ACCESS
  • Locked
    5.  Methods Used for Security Risk Identification
    6m 49s
    In this video, you’ll learn that the process of risk identification uses different methods. To begin with, you’ll learn about brainstorming, which is typically done in a meeting where ideas generate other ideas. Next, you’ll learn about checklist analysis, where organizations compile risks encountered on different projects. You’ll then look at the interviewing method and root cause analysis. You’ll learn that with root cause analysis, you’ll identify risks based on their root causes. FREE ACCESS
  • Locked
    6.  Best Practices for Security Risk Identification
    6m 44s
    In this video, you’ll learn about the process of risk identification and its benefits. You’ll learn that risk identification gets the risk assessment process started. This process means you’re able to spot risks as early as possible. You’ll discover risk identification should be performed at the start of any project, but can be repeated at any time. You’ll learn that the earlier you complete the risk identification process, the sooner you're able to identify risks. FREE ACCESS
  • Locked
    7.  Characteristics of a Security Risk Register
    7m 47s
    In this video, you’ll review the basic concept of risk register. This is a centralized repository of risk. You’ll look at the key features of a risk register, which is used as a management tool. This is where you’ll identify and list risks. You’ll learn that these change as the risks are re-assessed. You’ll also discover that the risk register is adaptable, and there should always be someone managing the risk register. FREE ACCESS
  • Locked
    8.  Creating a Security Risk Register
    5m 3s
    In this video, you’ll watch a demo. You’ll learn how to create a risk register. You’ll open a template labeled Risk Register. Following the onscreen directions, you will input the information needed to complete the risk register. FREE ACCESS
  • Locked
    9.  Course Summary
    1m 26s
    In this video, you’ll review what you’ve learned in the course. In this course, you learned the basic concepts of risk identification. You explored threats versus risks, risk identification, the risk identification process, methods used for risk identification. You also learned best practices for risk identification and the risk register.   FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)
Rating 4.6 of 383 users Rating 4.6 of 383 users (383)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 47 users Rating 4.4 of 47 users (47)
Rating 4.5 of 190 users Rating 4.5 of 190 users (190)
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)