Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Risk Management

This course presents a complete framework for the oversight, evaluation, mitigation, and monitoring of risks to information technology assets.

What you'll learn

This course presents a complete framework for the oversight, evaluation, mitigation, and monitoring of risks to information technology assets. Effective risk management requires a structured, organized approach that should identify high-value assets, describe their environment, analyze their vulnerabilities and threats, and assess the risks based on likelihood and impact of exploitation. Using a sound basis for risk assessment sets the foundation for risk mitigation and should be an integral part of any information security program.

Table of contents