Risk Management

Learn key concepts related to risk management, including policies and procedures, business impact analysis and threat and risk assessments.

16 videos  //  129 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

This course introduces the key concepts of information security risk management. It explains the purpose of risk assessments and how quantitative and qualitative risk assessments are performed. The course also covers threat assessments, risk response techniques and security policies.

Course syllabus

The CIA of SecurityDuration: 3:50

In this episode, Mike discusses the CIA goals of security: confidentiality, integrity and availability.

What is Risk?Duration: 9:58

In this episode, Mike explains risk and related concepts.

Threat ActorsDuration: 6:44

In this episode, Mike explains the types of man-made threats that can attack a system.

Managing RiskDuration: 12:01

In this episode, Mike explains the terms and processes to manage risk.

Using Guides for Risk AssessmentDuration: 6:28

In this episode, Mike discusses how to use benchmarks and other measurements to implement hardware and software in an environment.

Security ControlsDuration: 7:28

In this episode, Mike explains the three categories of security controls.

Interesting Security ControlsDuration: 3:20

In this episode, Mike discusses other related security controls.

Defense in DepthDuration: 5:01

In this episode, Mike reviews the concepts of defense in depth, as well as combining or fortifying security controls.

IT Security GovernanceDuration: 8:23

In this episode, Mike explains the concept of security governance: policies, standards and procedures.

Security PoliciesDuration: 8:22

In this episode, Mike addresses various examples of security policies.

FrameworksDuration: 8:26

In this episode, Mike shares the benefits of using frameworks, and how to apply them to a security program.

Quantitative Risk CalculationsDuration: 8:16

In this episode, Mike looks at the impact of risk.

Business Impact AnalysisDuration: 12:03

In this episode, Mike identifies what methods can directly address issues for a company and how to categorize impact types to maintain business continuity.

Organizing DataDuration: 10:04

In this episode, Mike discusses data handling and how data is protected within an organization.

Security TrainingDuration: 10:06

In this episode, Mike goes through the controls and roles that make security training work.

Third-Party AgreementsDuration: 8:47

In this episode, Mike discusses types and the importance third-party agreements and how they affect IT security.

Meet the author

Mike Meyers

LinkedIn

Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec