Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Risk Management 101 for IT Professionals: Essential Concepts
Section 1: Course Introduction
Welcome to the Course! (4:36)
Why Learn IT Risk Management from Me? (1:36)
Course Lecture PDFs
Join our Facebook Student Community
Student Exercise: Introduce Yourself
Section 2: Understanding Risk
Section Introduction (0:42)
What is a Risk? (3:49)
What is an Issue? (1:53)
What is Risk Management? (3:58)
Who Uses Risk Management? (2:10)
The Elements of Risk (2:02)
Assets, Threats, Vulnerabilities and Risks (2:24)
Tangible and Intangible Assets (4:57)
The Three Categories of Threats (5:01)
Common IT Vulnerabilities (3:19)
Risk Categories (5:49)
The Risk Management Lifecycle (1:26)
Understanding Risk Section Quiz
Section 3: Why We Need Risk Management
Section Introduction (0:54)
Why do We Need Risk Management? (4:38)
Legal and Regulatory Concerns (6:51)
Deeper Dive Look at IT Vulnerabilities (4:11)
The State of Cybersecurity (5:55)
Colonial Pipeline Case Study (0:40)
Student Exercise: Colonial Pipeline Case Study Analysis
Section 4: Risk Identification
Section Introduction (0:36)
The Role of Risk Appetite and Tolerance (4:14)
Identifying IT Risks (4:18)
IT Security Assessments (6:47)
SWOT Analysis Case Study: Cloud Computing (4:27)
Understanding Risk Interdependencies (2:50)
Risk Identification Section Quiz
Section 5: Risk Assessments
Section Introduction (0:26)
Types of Risk Assessments (2:26)
Qualitative Risk Assessments (4:16)
Quantitative Risk Assessments (8:55)
Sample Risk Assessments (7:56)
Risk Assessments Section Quiz
Section 6: Risk Responses and Controls
Section Introduction (0:52)
The Four Risk Response Categories (0:49)
Risk Avoidance and Acceptance (4:14)
Risk Mitigation and Transference (3:54)
Understanding Security Controls (4:07)
Combined Risk Response Activities (1:48)
Understanding Residual Risk (2:01)
Risk Responses and Controls Section Quiz
Section 7 : The Risk Register
Section Introduction (0:21)
What is a Risk Register? (2:24)
Benefits of a Risk Register
Benefits of a Risk Register (3:30)
Risk Register Walk-Through (10:36)
Section 8: Risk Monitoring and Control
Section Introduction (0:44)
Monitoring & Control (4:47)
Two Methods of Risk Monitoring (3:36)
Risk Monitoring Tools (2:29)
The Risk PMO, Champions and Advocates (4:08)
Monitoring and Control Section Quiz
Section 9: Why Risk Management Fails
Why Risk Management Fails (10:29)
Section 10: Conclusion & Next Steps
Course Recap & Conclusion (2:21)
Assets, Threats, Vulnerabilities and Risks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock