System Security Certified Practitioner (SSCP 2018): Risk Management

  • 12 Videos | 45m 51s
  • Includes Assessment
  • Earns a Badge
Likes 49 Likes 49
This 12-video course explores risk management when engaging in business activities supported by IT solutions. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam as you examine risk classification, and learn how to identify digital assets and threats, including natural disasters such as floods, fires, or storms; manmade disasters, arson, terrorism; and identity theft. This course demonstrates threat modeling, and the process to use to identify and prioritize threats. You will examine how to optimize resources, and to focus on reducing risks, and explore counter measures in relation to prioritized threats. Next, explore BIA (business impact analysis), and its importance to business continuity. You will learn how a BIA can be incorporated into a DRP (disaster recovery plan) to facilitate recovery of a failed system. Learners will examine the use of a risk registry with the likelihood of the risk occurrence, the business impact should it occur, and a severity rating. You will learn about risk avoidance and mitigation. Finally, you will explore cost efficiencies for risk mitigation.

WHAT YOU WILL LEARN

  • describe how proper risk management can allow businesses to engage in productive activities while maintaining levels of security
    categorize risks using a risk register and common vulnerability scoring system, and share threat data
    identify and prioritize potential security threats
    determine how realized threats can negatively affect business processes
    apply common risk management frameworks such as ISO and NIST to organizational threats
    safely engage in endeavors that can present threats
  • offload risks to third parties
    implement security controls to reduce the impact of realized threats
    avoid risk by not engaging in activities that present threats
    use industry-standard calculations to determine the feasibility of implementing a security control
    implement risk management techniques

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 31s
    UP NEXT
  • Playable
    2. 
    Risk Management Overview
    2m 40s
  • Locked
    3. 
    Identifying and Prioritizing Risks
    4m 23s
  • Locked
    4. 
    Threat Modeling
    6m 17s
  • Locked
    5. 
    Business Impact Analysis
    4m 19s
  • Locked
    6. 
    Managing Risks through Common Frameworks
    2m 52s
  • Locked
    7. 
    Risk Acceptance
    3m 25s
  • Locked
    8. 
    Risk Transfer and Recasting
    3m 32s
  • Locked
    9. 
    Risk Mitigation
    2m 38s
  • Locked
    10. 
    Risk Avoidance
    2m 26s
  • Locked
    11. 
    Risk and Downtime Calculations
    4m 1s
  • Locked
    12. 
    Exercise: Plan a Risk Management Strategy
    2m 48s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE