![]() |
Udemy - Cyber Security Risk Management by Andrew Stephen - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy - Cyber Security Risk Management by Andrew Stephen (/Thread-Udemy-Cyber-Security-Risk-Management-by-Andrew-Stephen) |
Udemy - Cyber Security Risk Management by Andrew Stephen - OneDDL - 05-27-2025 ![]() Free Download Udemy - Cyber Security Risk Management by Andrew Stephen Last updated 1/2023 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 811.24 MB | Duration: 4h 8m A comprehensive overview of risk and management principles and practices as applied in a cyber security context. What you'll learn Develop an understanding of what risk is and how it can be managed. How to create a risk management framework within your organisation. How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate. How to perform detailed analysis of risk and develop risk treatment plans. How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting. Requirements No special requirements. Description In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.You will learn how to identify, assess and articulate risk as well as options available for treating risk and which may be most appropriate for your situation.This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 What Is Risk? Lecture 3 IT & Cyber Security Risk Lecture 4 Components of a Risk Lecture 5 Articulating Risk Section 2: Risk Management Lecture 6 Introduction Lecture 7 What is Risk Management Lecture 8 Objectives of Risk Management Lecture 9 Risk Management vs Risk Minimisation Lecture 10 Risk Management Principles Lecture 11 Risk Management Framework Lecture 12 Mandate & Commitment Lecture 13 Designing your framework Lecture 14 Designing your framework - Organisational Context Lecture 15 Designing your framework - Establish Policy Lecture 16 Designing your framework - Accountability Lecture 17 Designing your framework - Organisational Integration Lecture 18 Designing your framework - Communication & Reporting Lecture 19 Designing your framework - Implementation Lecture 20 Designing your framework - Monitoring & Review Lecture 21 Designing your framework - Continual Improvement Lecture 22 The risk management process Lecture 23 The risk management process - Communication & Consultation Lecture 24 The risk management process - Context Establishment Lecture 25 The risk management process - Risk Assessment Lecture 26 The risk management process - Risk Treatment Lecture 27 The risk management process - Monitoring & Review Lecture 28 The risk management process - Auditability and Traceability Lecture 29 Risk Management - Maturity Models Lecture 30 Risk Management - Risk Assessment & Measurement Section 3: Risk Management - Risk Assessment & Measurement Lecture 31 Introduction Lecture 32 Risk Assessment & Measurement - Terminology Lecture 33 The risk management process (recap) Lecture 34 Risk Identification (Part 1) Lecture 35 Risk Identification (Part 2) Lecture 36 Risk Identification (Part 3) Lecture 37 Risk Analysys Lecture 38 Risk Analysis - Likelihood Lecture 39 Risk Analysis - Consequence/Impact Lecture 40 Risk Analysis - Consequence Examples Lecture 41 Risk Analysis - Risk Matrix Lecture 42 Risk Analysis - Analysis Example (1) Lecture 43 Risk Analysis - Analysis Example (2) Lecture 44 Risk Evaluation Lecture 45 Risk Treatment Lecture 46 Risk Treatment Plan Example (1) Lecture 47 Risk Treatment Considerations Section 4: Cyber security risk management in practice Lecture 48 Introduction Lecture 49 Creating an IT risk register Lecture 50 Example Excel risk register Lecture 51 Risk governance - 3 lines of defence model Lecture 52 Risk bowties Information Technology Managers,Information/Cyber Security Managers,Information Security Professionals,Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |