Risk Management

  • Course level: Intermediate

Description

This course provides a bird’s eye view into the main concepts of Cyber Security and IT Risk Management as implemented within modern enterprises.

The course explains the below concepts in a concise manner:

  • Policies and Standards
  • Confidentiality, Integrity, Availability
  • Business Impact Assessment
  • Risk Assessment Methodology
  • Risk Register
  • Defense In Depth
  • Hardware Inventory
  • Software Inventory
  • Authentication
  • Authorization
  • Identity and Access Management (IAM)
  • Privileged Access Management (PAM)
  • Secure Coding
  • Logging
  • Backups
  • Security Awareness
  • Segregation of Environments
  • Segregation of Duties
  • Penetration Testing
  • ITSM Onboarding
  • IT Controls Testing
  • Disaster Recovery
  • Third Party Risk Assessment
  • Attack Surfaces
  • Network Access Control (NAC)
  • Network Segmentation and Firewalling
  • Intrusion Prevention System
  • Honeypots
  • Platform Hardening
  • Antivirus
  • Email Protection
  • Web Protection
  • Data Loss Prevention (DLP)
  • Vulnerability Scanning
  • Patching
  • IoT Device Security
  • Password Managers
  • Secrets Management Solution

What Will I Learn?

  • High level overview of IT Risk Management Concepts in the Enterprise
  • High level overview of Cyber Security Concepts in the Enterprise

Topics for this course

1 Lessons

Introduction?

What is risk management
Risk management concepts00:00:00

About the instructor

0 (0 ratings)

1 Courses

0 students

Placeholder

Material Includes

  • 1 hour on-demand video
  • 2 articles
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of completion

You must have a membership plan to enrol in this course.

Requirements

  • Basic understanding of IT in the Enterprise