Internet And Network Technologies
Evaluating and Planning for Security Risks
Final Exam: Evaluating and Planning for Security Risks
Security Risks: Key Risk Terms & Concepts
Security Risks: Performing Security Risk Assessments
Security Risks: Performing Security Risk Identification
Security Risks: Planning for Security Risk Management

Final Exam: Evaluating and Planning for Security Risks

Course Number:
it_fesedml_02_enus
Lesson Objectives

Final Exam: Evaluating and Planning for Security Risks

  • define risk assessment
  • demonstrate vulnerability assessment
  • describe risk management process for security (with a key focus on standards such as ISO 31000)
  • describe risk strategies taking security-related work examples
  • describe the details of a risk management plan
  • describe the risk identification process
  • describe vulnerability assessment and penetration testing as security assessment methods
  • differentiate between risk appetite and risk tolerance
  • identify the need to prioritize risks
  • list risk treatment methods (Risk acceptance, avoidance, reduction, transfer)
  • list the activities in a risk management process
  • list the methods used for risk identification
  • recognize how increasing risk tolerance and risk appetite can be an effective risk management strategy
  • recognize security threat as a risk
  • recognize the need for risk identification

Overview/Description

Final Exam: Evaluating and Planning for Security Risks will test your knowledge and application of the topics presented throughout the Evaluating and Planning for Security Risks track of the Skillsoft Aspire Security Essentials for Decision Makers and Leaders Journey.



Target

Prerequisites: none

Security Risks: Key Risk Terms & Concepts

Course Number:
it_smepsrdj_01_enus
Lesson Objectives

Security Risks: Key Risk Terms & Concepts

  • discover the key concepts covered in this course
  • outline how risks are related to assets
  • identify the similarities and differences between likelihood and probability assessment
  • recognize the role of vulnerabilities in risks and the correlation between risk and threat
  • outline risk probability, the impact generated by it, and how to measure it using a risk score
  • describe risk severity and identify various risk security levels
  • identify potential risks that may exist within an organization and differentiate between risk appetite and risk tolerance
  • define the concept and advantages of a risk management process
  • recognize the importance of a risk management plan and identify its components
  • describe the role of a risk register in managing risk and outline the elements of risks listed within it
  • describe the features of different risk treatment methods
  • recognize the importance of managing risk and implementing a risk-based approach
  • outline the elements of the COBIT 5 framework and describe the ISO 31000 standard for risk management
  • list the three key stages of a risk management process: risk identification, risk assessment, and risk management
  • illustrate the importance of security risk assessment in preempting and preparing for risks, prioritizing risks, and identifying assets to be protected
  • summarize the key concepts covered in this course

Overview/Description
Familiarity with key terms and concepts associated with security risk enables security leaders to identify, evaluate, and prioritize security risks. In this course, you'll get familiar with the terminologies, activities, and concepts associated with a security risk management process. You'll start by discovering the interdependence between assets, vulnerabilities, threats, and risks. You'll then investigate how to assess risk probability, measure the impact created by it, and the difference between risk appetite and risk tolerance. Next, you'll examine the components, benefits, and stages of a risk management process. You'll also identify different methods of treating risk and the importance of implementing controls as a part of a risk-based approach. Lastly, you'll recognize the standards for risk management and the advantages of managing and assessing security risk.

Target

Security Risks: Performing Security Risk Assessments

Course Number:
it_smepsrdj_03_enus
Lesson Objectives

Security Risks: Performing Security Risk Assessments

  • discover the key concepts covered in this course
  • define the concept, advantages, and activities of risk assessment
  • list different types of risk assessment
  • describe the characteristics of qualitative risk assessment along with its advantages and disadvantages
  • describe the characteristics of quantitative risk assessment along with its advantages and disadvantages
  • identify vulnerability assessment and penetration testing as security assessment methods
  • demonstrate security vulnerability assessment
  • outline risk categorization using the four-quadrant risk classification
  • illustrate how to update a risk register in Microsoft Excel
  • recognize the importance of prioritizing risks
  • outline the role of probability-impact matrix in prioritizing risks
  • demonstrate how to prioritize risks in a security risk register using a probability-impact matrix
  • summarize the key concepts covered in this course

Overview/Description
The categorization of security risks is essential for effectively assessing and managing risk. In this course, you'll explore the assessment, classification, and prioritization of security risks. You'll begin by outlining the concept of risk assessment and the advantages of different risk assessment techniques. You'll also investigate the features of security assessment methods, such as vulnerability assessment and penetration testing, and discover how to assess security vulnerability. Moving on, you'll recognize the significance of risk categorization and how to update a risk register in Microsoft Excel using a four-quadrant risk classification matrix. Finally, you'll identify the purpose and process of risk prioritization, and the role of a probability-impact matrix in determining risk levels. You'll then investigate how to use the matrix to prioritize risks on a security risk register.

Target

Security Risks: Performing Security Risk Identification

Course Number:
it_smepsrdj_02_enus
Lesson Objectives

Security Risks: Performing Security Risk Identification

  • discover the key concepts covered in this course
  • identify the differences between threat and risk
  • recognize the purpose and importance of risk identification
  • outline the risk identification process and recognize organizational components impacted by risk
  • distinguish between different methods used for risk identification
  • list the best practices used for risk identification and identify the benefits of the process
  • recognize the characteristics and functions of a risk register
  • demonstrate the method to create a risk register in Microsoft Excel
  • summarize the key concepts covered in this course

Overview/Description
Effective security risk management often begins with proper security risk identification. In this course, you'll examine various components of the risk identification process and different techniques used to identify risk. You'll begin by distinguishing between threat and risk. You'll then get familiar with other terminologies and concepts associated with risk identification. Moving on, you'll recognize the significance of risk identification in recognizing assets and services that are risk-prone. You'll also investigate different methods used to identify risk and best practices for the risk identification process. Later in the course, you'll outline common security-related risks and their impact on different components of an organization. Finally, you'll examine the features of a security risk register, its role in risk management, and how to create one in Microsoft Excel.

Target

Security Risks: Planning for Security Risk Management

Course Number:
it_smepsrdj_04_enus
Lesson Objectives

Security Risks: Planning for Security Risk Management

  • discover the key concepts covered in this course
  • describe the purpose of risk management and list the best practices
  • outline the stages and activities in a risk management process
  • identify the components of a risk management plan and recognize different risk categories
  • list the elements of a risk management plan and the steps involved in creating one
  • describe the features of a risk mitigation plan and its role in risk management
  • create a risk mitigation plan in Microsoft Word
  • outline the factors that influence risk tolerance and risk appetite and the differences between them
  • examine the concept of risk monitoring and control measures and list their outcomes in risk management planning
  • recognize the importance of treating risks and list different risk strategy methods
  • describe the role of decision making in managing risks
  • summarize the key concepts covered in this course

Overview/Description
Highly effective security leaders recognize that they must prioritize and focus their efforts on managing critical security risks. Therefore, once a security risk is identified, it must be carefully evaluated. In this course, you'll identify the activities involved in a risk management process, the importance of risk strategies in the context of work environments, and essential decisions required for managing security risks effectively. Moving on, you'll investigate the components of a risk management plan and how to improve a risk management strategy by increasing risk tolerance and risk appetite. You'll also outline the importance of mitigation plans and discover how to create one in Microsoft Word. Lastly, you'll recognize the role of risk monitoring and control measures in risk management planning and the factors that shape an organization's approach to making decisions in handling risks.

Target

Close Chat Live