What you'll learn:
- Understand the foundations of Risk Management in cybersecurity
- Learn how to determine and analyze risks
- Learn how to mitigate, transfer, avoid and monitor risks
- Effectively manage third party cyber risks
If you are interested in learning how to determine and manage risks from a cyber security perspective, you have come to the right place. Welcome to the Cyber Risk Management course for ITmanagers and in this course you are going to learn the following:
How to identify risks
How to analyze and determine the severity of a risk
How to manage and monitor risks effectively
You will learn important cyber risk methods such as risk mitigation, avoidance, transference and acceptance.
You will learn about threats and vulnerabilities and how they combine to produce risks that your company might face. We will also discuss how to classify information and how to successfully implement security controls to limit risks.
With so many companies now sharing their data and networks with third parties, third party risk management has become extremely important which is why we will discuss this subject in extensive detail. You will learn the six steps to effectively manage third party risks.
Finally we will conclude by taking a look at vulnerability management and how ethical hacking and penetration testing can be used to reduce vulnerabilities which also directly leads to your company facing less risks.
We will also cover both quantitative and qualitative risk analysis and how they are calculated.