Assessing Information Security Risk
- Description
- Curriculum
- FAQ
- Reviews
In this course we take a deep dive into the risk assessment element or component of the risk management process as it relates to information security.
This course focuses on a practical approach to the risk assessment component of risk management—providing a step-by-step process for organizations on: (i) how to prepare for risk assessments; (ii) how to conduct the risk assessments; (iii) how to communicate risk assessment results to key organizational personnel; and (iv) how to maintain the risk assessments over time.
Risk assessments are not simply one-time activities that provide permanent and definitive information for decision makers to guide and inform responses to information security risks. Rather, organizations employ risk assessments on an ongoing basis throughout the system development life cycle and across all of the tiers in the risk management hierarchy and that is what we intend to achieve by doing this course.
This course is broken down as follows:
-
SECTION-1: FOUNDATION
-
Intro to KEY RISK CONCEPTS
1- What does it mean to assess information security risks?
2a- Why is it necessary and what roles does this process plays in keeping an organization’s, businesses, people, processes, technology and data secure?
2b-Risk assessments can support a wide variety of risk-based decisions and activities
-
-
SECTION-2: CONDUCTING THE RISK ASSESSMENT
-
Intro to the case scenario and its requirements
-
The approach to addressing the case
-
1-PREPARATION PHASE
-
2-CONDUCTING THE RISK ASSESSMENT PHASE
-
3-COMMUNICATING AND SHARING RISK ASSESSMENT INFORMATION PHASE
-
4-MAINTAINING THE RISK ASSESSMENT PHASE
-
5-PRODUCTING THE FINAL REPORT: Risk Assessment Report for FinSecure, Inc.
Delve into this course to see the other wonderful resources presented in the following sections.
-
-
SECTION-3:
-
SECTION-4:
-
SECTION-5:
-
1IntroductionVideo lesson
-
22-Course Content OutlineVideo lesson
-
33-Why is it necessary to assess Information Security RiskVideo lesson
-
44-Components of Assessing Information Security Risk NIST SP 800-30r1Video lesson
-
55-Overview of NIST SP 800-30r1 Assessment phasesVideo lesson
-
66-Intro to Key Risk ConceptsVideo lesson
-
77-End of Section-1-FundamentalsVideo lesson
-
88-Case PrepVideo lesson
-
99-Case Scenario OverviewVideo lesson
-
1010-Phase #1-Preparing for the IS risk assessment according to NIST SP 800-30Video lesson
-
1111-Critical Questions and Considerations Before Starting & During each phaseVideo lesson
-
1212-Establishment of Security Team Structure for Conducting the AssessmentVideo lesson
-
1313-Project Plan for Conducting Risk Assessment for FinSecureVideo lesson
-
1414-Task assignment with the help of Open-Source ToolsVideo lesson
-
1515-Phase #2-Conducting the IS risk assessment according to NIST SP 800-30Video lesson
-
1616-Summary of vulnerability Risks, Discovery Methods, and Mitigation ActionsVideo lesson
-
1717-Phase #3-Communicating and Sharing Risk Assessment Results according to NISTVideo lesson
-
1818-Phase #4-Maintaining Risk Assessment according to NIST SP 800-30Video lesson
-
1919-Reasons for each task in each phase of the ISR assessment processVideo lesson
-
2020-PRODUCING THE FINAL REPORT for the Risk Assessment-pt1Video lesson
-
2121-PRODUCING THE FINAL REPORT for the Risk Assessment-pt2Video lesson
-
2222-PRODUCING THE FINAL REPORT for the Risk Assessment-pt3Video lesson
External Links May Contain Affiliate Links read more