oaxino Posted May 11 Report Share Posted May 11 Last updated 1/2023MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 811.24 MB | Duration: 4h 8mA comprehensive overview of risk and management principles and practices as applied in a cyber security context.What you'll learnDevelop an understanding of what risk is and how it can be managed.How to create a risk management framework within your organisation.How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.How to perform detailed analysis of risk and develop risk treatment plans.How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting.RequirementsNo special requirements.DescriptionIn this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.You will learn how to identify, assess and articulate risk as well as options available for treating risk and which may be most appropriate for your situation.This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization.OverviewSection 1: IntroductionLecture 1 IntroductionLecture 2 What Is Risk?Lecture 3 IT & Cyber Security RiskLecture 4 Components of a RiskLecture 5 Articulating RiskSection 2: Risk ManagementLecture 6 IntroductionLecture 7 What is Risk ManagementLecture 8 Objectives of Risk ManagementLecture 9 Risk Management vs Risk MinimisationLecture 10 Risk Management PrinciplesLecture 11 Risk Management FrameworkLecture 12 Mandate & CommitmentLecture 13 Designing your frameworkLecture 14 Designing your framework - Organisational ContextLecture 15 Designing your framework - Establish PolicyLecture 16 Designing your framework - AccountabilityLecture 17 Designing your framework - Organisational IntegrationLecture 18 Designing your framework - Communication & ReportingLecture 19 Designing your framework - ImplementationLecture 20 Designing your framework - Monitoring & ReviewLecture 21 Designing your framework - Continual ImprovementLecture 22 The risk management processLecture 23 The risk management process - Communication & ConsultationLecture 24 The risk management process - Context EstablishmentLecture 25 The risk management process - Risk AssessmentLecture 26 The risk management process - Risk TreatmentLecture 27 The risk management process - Monitoring & ReviewLecture 28 The risk management process - Auditability and TraceabilityLecture 29 Risk Management - Maturity ModelsLecture 30 Risk Management - Risk Assessment & MeasurementSection 3: Risk Management - Risk Assessment & MeasurementLecture 31 IntroductionLecture 32 Risk Assessment & Measurement - TerminologyLecture 33 The risk management process (recap)Lecture 34 Risk Identification (Part 1)Lecture 35 Risk Identification (Part 2)Lecture 36 Risk Identification (Part 3)Lecture 37 Risk AnalysysLecture 38 Risk Analysis - LikelihoodLecture 39 Risk Analysis - Consequence/ImpactLecture 40 Risk Analysis - Consequence ExamplesLecture 41 Risk Analysis - Risk MatrixLecture 42 Risk Analysis - Analysis Example (1)Lecture 43 Risk Analysis - Analysis Example (2)Lecture 44 Risk EvaluationLecture 45 Risk TreatmentLecture 46 Risk Treatment Plan Example (1)Lecture 47 Risk Treatment ConsiderationsSection 4: Cyber security risk management in practiceLecture 48 IntroductionLecture 49 Creating an IT risk registerLecture 50 Example Excel risk registerLecture 51 Risk governance - 3 lines of defence modelLecture 52 Risk bowtiesInformation Technology Managers,Information/Cyber Security Managers,Information Security Professionals,Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information securityScreenshotsDownload linkrapidgator.net:https://rapidgator.net/file/3365863488754238580bcf8078010c0a/lafbp.Cyber.Security.Risk.Management.by.Andrew.Stephen.rar.htmlnitroflare.com:https://nitroflare.com/view/FBD1503518C2EDC/lafbp.Cyber.Security.Risk.Management.by.Andrew.Stephen.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now