Description
Course info
Level
Intermediate
Updated
May 24, 2018
Duration
2h 33m
Description

Security Professionals rely on risk management to justify and develop an Information Security program. In this course, Risk Assessment and Management, you will learn comprehensive knowledge of risk management and the theories, concepts, and practices of threat modeling and enterprise risk management. First, you will learn about establishing the context for risk management. Next, you will compare the various methods of risk assessment. Finally, you will examine the options for risk response and monitoring. When you’re finished with this course, you will have the skills and knowledge of information security needed to be an effective manager and practitioner in information and risk management.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
Communications and Network Security
Intermediate
2h 59m
18 Sep 2018
Physical Security
Intermediate
1h 19m
6 Aug 2018
Cryptography Application
Intermediate
2h 22m
3 Aug 2018
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Kevin Henry, an information security consultant and educator and holder of several certifications in information security management, for example, the CISSP, CISM, and CCSP. I look forward to sharing knowledge and experience with you on this course on risk assessment and management. This course will help you gain an essential understanding of the challenges of risk management and the elements of the risk management framework. Risk management is the underpinning of information security strategies and programs, and the information security professional needs to be able to conduct and benefit from the principles and practices of secure risk management. This course will address risk context and framing, risk assessment, and risk response and monitoring. By the end of this course, you'll be knowledgeable in the processes and elements of risk management. I hope you'll join me on this journey to learn about the core concepts of risk management and how this course can help you in your role and career through this course at Pluralsight.