05-11-2025, 10:45 AM
![[Image: 5oY5OUkstlD32ZoLP5Aq3Q1vkodaB5uA.avif]](https://sanet.pics/storage-11/0525/avif/5oY5OUkstlD32ZoLP5Aq3Q1vkodaB5uA.avif)
Last updated 1/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 811.24 MB | Duration: 4h 8m
A comprehensive overview of risk and management principles and practices as applied in a cyber security context.
What you'll learn
Develop an understanding of what risk is and how it can be managed.
How to create a risk management framework within your organisation.
How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.
How to perform detailed analysis of risk and develop risk treatment plans.
How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting.
Requirements
No special requirements.
Description
In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.You will learn how to identify, assess and articulate risk as well as options available for treating risk and which may be most appropriate for your situation.This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 What Is Risk?
Lecture 3 IT & Cyber Security Risk
Lecture 4 Components of a Risk
Lecture 5 Articulating Risk
Section 2: Risk Management
Lecture 6 Introduction
Lecture 7 What is Risk Management
Lecture 8 Objectives of Risk Management
Lecture 9 Risk Management vs Risk Minimisation
Lecture 10 Risk Management Principles
Lecture 11 Risk Management Framework
Lecture 12 Mandate & Commitment
Lecture 13 Designing your framework
Lecture 14 Designing your framework - Organisational Context
Lecture 15 Designing your framework - Establish Policy
Lecture 16 Designing your framework - Accountability
Lecture 17 Designing your framework - Organisational Integration
Lecture 18 Designing your framework - Communication & Reporting
Lecture 19 Designing your framework - Implementation
Lecture 20 Designing your framework - Monitoring & Review
Lecture 21 Designing your framework - Continual Improvement
Lecture 22 The risk management process
Lecture 23 The risk management process - Communication & Consultation
Lecture 24 The risk management process - Context Establishment
Lecture 25 The risk management process - Risk Assessment
Lecture 26 The risk management process - Risk Treatment
Lecture 27 The risk management process - Monitoring & Review
Lecture 28 The risk management process - Auditability and Traceability
Lecture 29 Risk Management - Maturity Models
Lecture 30 Risk Management - Risk Assessment & Measurement
Section 3: Risk Management - Risk Assessment & Measurement
Lecture 31 Introduction
Lecture 32 Risk Assessment & Measurement - Terminology
Lecture 33 The risk management process (recap)
Lecture 34 Risk Identification (Part 1)
Lecture 35 Risk Identification (Part 2)
Lecture 36 Risk Identification (Part 3)
Lecture 37 Risk Analysys
Lecture 38 Risk Analysis - Likelihood
Lecture 39 Risk Analysis - Consequence/Impact
Lecture 40 Risk Analysis - Consequence Examples
Lecture 41 Risk Analysis - Risk Matrix
Lecture 42 Risk Analysis - Analysis Example (1)
Lecture 43 Risk Analysis - Analysis Example (2)
Lecture 44 Risk Evaluation
Lecture 45 Risk Treatment
Lecture 46 Risk Treatment Plan Example (1)
Lecture 47 Risk Treatment Considerations
Section 4: Cyber security risk management in practice
Lecture 48 Introduction
Lecture 49 Creating an IT risk register
Lecture 50 Example Excel risk register
Lecture 51 Risk governance - 3 lines of defence model
Lecture 52 Risk bowties
Information Technology Managers,Information/Cyber Security Managers,Information Security Professionals,Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security
Screenshots
![[Image: th_1niUTrETPflDPGeE4WRw7sPEVt6kp6P5.avif]](https://sanet.pics/storage-11/0525/avif/th_1niUTrETPflDPGeE4WRw7sPEVt6kp6P5.avif)
Download link
rapidgator.net:
Quote:https://rapidgator.net/file/336586348875...n.rar.html
nitroflare.com:
Quote:https://nitroflare.com/view/FBD1503518C2...tephen.rar