About This Course
Risk management is a challenge for most organizations. This course addresses the key parts of the risk management process starting with risk identification. The course first examines the factors that influence risk, from management attitudes and awareness to laws and standards.
Next, you will learn about how to identify asset values, threats, and vulnerabilities in your organization. Last, you will learn about management’s responsibilities when it comes to risk identification.
By the end of this course, you will understand how to perform risk identification in your organization.
Who this course is for:
- This course is for Managers and IT professionals.
Our Promise to You
By the end of this course, you will have learned about part two of risk and information systems control certification.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about achieving the Certified In Risk and Information Systems Control Part Two.
|Section 1 - Key Topics And The Learning Objectives|
|The Methodology Of Risk Management||00:00:00|
|Section 2 - The Methodology Of Risk Identification|
|Methods To Identify Risk||00:00:00|
|IT Risk Identification Objective||00:00:00|
|Section 3 - Gathering Risk Data And Culture|
|Gathering Risk Data And Culture||00:00:00|
|Determination Of Risk Acceptance Levels||00:00:00|
|Section 4 - Ethics, Laws, And Standards|
|Standards And Best Practices||00:00:00|
|Section 5 - Asset Values, Threats, And Vulnerabilities|
|Threats And Vulnerabilities||00:00:00|
|Risk Related To Business Processes And Risk Scenarios||00:00:00|
|Section 6 - Management Responsibilities And Awareness|
|Risk Acceptance And Risk Tolerance||00:00:00|