This course will teach you common procedures to complete practical risk assessments to understand your current information security risk exposure.
Every organization needs to carefully manage finite resources and budgets in the course of implementing an information security strategy in order to protect the organization while achieving its business objectives. In this course, Information and Cyber Security GRC: Risk Management, you’ll learn the fundamentals of completing a risk assessment to understand and review information security in enterprise programs and activities. First, you’ll explore the objectives of an information security risk assessment. Second, you'll learn how to build a business and technology operating model to articulate the impact of undesirable disruption to an organization’s mission. Third, you'll use this model to create risk scenarios and understand the likelihood of threats exploiting a vulnerability in your operating environment.
Every organization needs to carefully manage finite resources and budgets in the course of implementing an information security strategy in order to protect the organization while achieving its business objectives. In this course, Information and Cyber Security GRC: Risk Management, you’ll learn the fundamentals of completing a risk assessment to understand and review information security in enterprise programs and activities. First, you’ll explore the objectives of an information security risk assessment. Second, you'll learn how to build a business and technology operating model to articulate the impact of undesirable disruption to an organization’s mission. Third, you'll use this model to create risk scenarios and understand the likelihood of threats exploiting a vulnerability in your operating environment.