Security Risks: Performing Security Risk Identification


Overview/Description
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Effective security risk management often begins with proper security risk identification. In this course, you'll examine various components of the risk identification process and different techniques used to identify risk. You'll begin by distinguishing between threat and risk. You'll then get familiar with other terminologies and concepts associated with risk identification. Moving on, you'll recognize the significance of risk identification in recognizing assets and services that are risk-prone. You'll also investigate different methods used to identify risk and best practices for the risk identification process. Later in the course, you'll outline common security-related risks and their impact on different components of an organization. Finally, you'll examine the features of a security risk register, its role in risk management, and how to create one in Microsoft Excel.

Prerequisites
none

Expected Duration (hours)
1.0

Lesson Objectives

Security Risks: Performing Security Risk Identification

  • discover the key concepts covered in this course
  • identify the differences between threat and risk
  • recognize the purpose and importance of risk identification
  • outline the risk identification process and recognize organizational components impacted by risk
  • distinguish between different methods used for risk identification
  • list the best practices used for risk identification and identify the benefits of the process
  • recognize the characteristics and functions of a risk register
  • demonstrate the method to create a risk register in Microsoft Excel
  • summarize the key concepts covered in this course
  • Course Number:
    it_smepsrdj_02_enus

    Expertise Level
    Beginner