kodyka Posted Saturday at 04:26 AM Share Posted Saturday at 04:26 AM Published 6/2024Created by Richea PerryMP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English | Duration: 26 Lectures ( 2h 56m ) | Size: 1.64 GBAssessing Information Security Risk Using NIST SP 800-30r1What you'll learn:A practical understanding of conducting a comprehensive risk assessment following NIST SP 800-30 guidelines.Foundations of assessing Information security RiskPreparation for an Information Security Risk AssessmentConducting an Information Security Risk AssessmentCommunicating and Sharing Results an Information Security Risk AssessmentHow to Maintain an Information Security Risk AssessmentHow to align an Information Security Risk Assessment with business objectivesHow to produce an Information Security Risk Assessment report to present to senior managementHow to develop, organize and structure an assessment teamRequirements:Basic Understanding of Information Security ConceptsFamiliarity with Risk Management FrameworksExperience in IT or Security RolesBasic Technical SkillsAwareness of Organizational Policies and ProceduresDescription:In this course we take a deep dive into the risk assessment element or component of the risk management process as it relates to information security.This course focuses on a practical approach to the risk assessment component of risk management-providing a step-by-step process for organizations on: (i) how to prepare for risk assessments; (ii) how to conduct the risk assessments; (iii) how to communicate risk assessment results to key organizational personnel; and (iv) how to maintain the risk assessments over time. Risk assessments are not simply one-time activities that provide permanent and definitive information for decision makers to guide and inform responses to information security risks. Rather, organizations employ risk assessments on an ongoing basis throughout the system development life cycle and across all of the tiers in the risk management hierarchy and that is what we intend to achieve by doing this course.This course is broken down as follows:SECTION-1: FOUNDATION Intro to KEY RISK CONCEPTS1- What does it mean to assess information security risks?2a- Why is it necessary and what roles does this process plays in keeping an organization's, businesses, people, processes, technology and data secure?2b-Risk assessments can support a wide variety of risk-based decisions and activitiesSECTION-2: CONDUCTING THE RISK ASSESSMENT Intro to the case scenario and its requirementsThe approach to addressing the case1-PREPARATION PHASE2-CONDUCTING THE RISK ASSESSMENT PHASE3-COMMUNICATING AND SHARING RISK ASSESSMENT INFORMATION PHASE4-MAINTAINING THE RISK ASSESSMENT PHASE5-PRODUCTING THE FINAL REPORT: Risk Assessment Report for FinSecure, Inc.Delve into this course to see the other wonderful resources presented in the following sections.SECTION-3:SECTION-4:SECTION-5Who this course is for:Chief Information Security Officers (CISOs)Risk Assessment ManagersSecurity AnalystsCompliance OfficersIT Operations ManagersIncident Response Team LeadsThird-Party Risk ManagersHomepagehttps://rapidgator.net/file/cd29f2dcd32c7c0aa880253348c3641c/Assessing_Information_Security_Risk.part2.rar.htmlhttps://rapidgator.net/file/3f1653c947a7a43d20b22a2cd5fe2e5a/Assessing_Information_Security_Risk.part1.rar.htmlhttps://nitroflare.com/view/6435B4D628E6056/Assessing_Information_Security_Risk.part2.rarhttps://nitroflare.com/view/FF0BF9BFEEC88D2/Assessing_Information_Security_Risk.part1.rarhttps://filestore.me/z3z4vmcfhj9b/Assessing_Information_Security_Risk.part2.rarhttps://filestore.me/tjrztce575qv/Assessing_Information_Security_Risk.part1.rar 1 Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now