Familiarity with the essential concepts associated with IT infrastructure and information security risk enables IT professionals to identify, evaluate, and prioritise security risks. In this course, you’ll get to know the terminologies, activities, and concepts associated with the security risk management process.
As you might expect, effective security risk management often begins with proper security risk identification. In the course, you’ll examine various components of the risk identification process and different techniques used to identify risk. You’ll explore the assessment, classification, and prioritisation of security risks. And you’ll identify the activities involved in the risk management process, the importance of risk strategies in the context of work environments, and essential decisions required for managing security risks effectively.
COURSE CONTENT
Module 1 – Key Risk Terms & Concepts
Module 2 – Performing Security Risk Identification
Module 3 – Performing Security Risk Assessments
Module 4 – Planning for Security Risk Management