Curriculum For This Course
Video tutorials list
-
Introduction to Risk Management
Video Name Time 1. Module Overview 2:00 2. Why study risk management? 7:00 3. What is IT for? 5:00 4. What does IT Governance help the company to understand? 4:00 5. What does IT Governance enable the enterprise to achieve? 3:00 6. Governance - General Topics 3:00 7. What is risk? 5:00 8. What are the main objectives of Risk Governance? 4:00 9. How do you know how much to spend to respond to a risk? 2:00 10. How to know in which control mechanisms should the company invest? 4:00 11. What is IT Risk Management? 2:00 12. What are the characteristics of a risk management program? 6:00 13. Key Points 5:00 14. Thank You! 1:00 -
IT Risk Identification
Video Name Time 1. Module Overview 2:00 2. What does "IT Risk Identification" mean? 4:00 3. What is the difference between risk capacity, appetite and tolerance? 6:00 4. What is a company's "risk culture"? 6:00 5. How to carry out the correct communication of risks? 4:00 6. What are the elements that make up a risk? 4:00 7. What is the terminology for identifying risks? 6:00 8. What are "risk factors"? 4:00 9. What are the main public sources of vulnerabilities? 1:00 10. What is a "vulnerability assessment"? 3:00 11. What are the key principles for information security risks? 5:00 12. How can the risk professional avoid being seen as obstructive? 3:00 13. What are the roles involved in the risk management process? 4:00 14. What are the methods of identifying risks? 2:00 15. What is the risk identification process? 2:00 16. What is a "risk scenario"? 4:00 17. What is the risk register? 2:00 18. What are risk awareness programs? 2:00 19. Key Points 6:00 20. Thank you! 1:00 -
IT Risk Assessment
Video Name Time 1. Module Overview 2:00 2. But after all, what has not yet been done in identifying risks? 4:00 3. What are the techniques used to assess IT risks? 2:00 4. What are the factors that affect the calculation of risk assessment? 7:00 5. What are the types of security controls? 4:00 6. How to check the current state of security controls? 5:00 7. What other sources of risk should be evaluated? 3:00 8. How is IT risk assessment done? 3:00 9. What are the methodologies for risk assessment? 3:00 10. How is risk classification performed? 3:00 11. Key Points 5:00 12. Thank You! 1:00 -
IT Risk Response and Mitigation
Video Name Time 1. Module Overview 1:00 2. Is not it just eliminating all the identified risks? 3:00 3. What are the options for responding to risks? 7:00 4. What are the key techniques for determining the best response to risks? 4:00 5. What are the types of risks? 3:00 6. Key Points 3:00 7. Thank You! 2:00 -
Risk and Control Monitoring and Reporting
Video Name Time 1. Module Overview 2:00 2. What are Key Risk Indicators? 4:00 3. What are the benefits of KRIs? 2:00 4. What are key performance indicators? 3:00 5. What data sources can be used for risk monitoring and reporting? 7:00 6. What are the types of assessments of safety controls and risks? 4:00 7. Key Points 3:00 8. Thank You! 3:00 -
Certification Test
Video Name Time 1. Module Overview 1:00 2. Requirements 5:00 3. About the Test 4:00
Add Comment