Security and Risk Management Online Training

    Taught by
    UPDATED: November 4, 2020
    Intermediate

    This Security and Risk Management training covers how to incorporate comprehensive analysis and risk-mitigating techniques to help organizations achieve information security objectives. Security and risk management is a pillar of actualizing security models. There are structured ways of thinking about how to identify and manage the risk you assume when developing, configuring, and maintaining your network.

    Start a free week

    Subscription options

    $59.00

    Access all premium content with a free week!

    • Quizzes
    • CyberVista® IT practice exams
    • Coaching
    • IT learner community
    Start a free week
    G2 Logo
    4.5 reviews stars

    What you'll learn

    • Information security fundamentals like confidentiality, integrity and availability
    • Reconciling security concerns with technical objectives
    • Modeling likely threats and anticipating responses to them
    • Standards and norms for writing policies, procedures and guidelines

    FAQs

    What is security and risk management and why is it so important?

    Security and risk management is a process of identifying, assessing and mitigating potential threats to an organization's assets – especially data and digital infrastructure. The aim of security and risk management is to safeguard against unauthorized access and cyberattacks (or even natural disasters and other hazards) as well as continue operations in the event of one happening. Good security and risk management ensure the confidentiality, integrity and availability of digital resources.

    What are some of the types of risk management?

    There are many ways of thinking about and categorizing risk management, and different organizations list different types of risk management. Risk avoidance is one of the most common types of risk management: eliminating exposures that could lead to risk. Risk mitigation is another type of risk management that seeks to reduce the impact of a risk should it happen. Risk transfer shifts the risk to a different party (like insurance).

    What are the benefits of risk management?

    Good risk management provides many benefits to the network or organization far beyond the simple nature of being safeguarded and protected from threats. Decision making is improved when risks are accurately identified and their likelihood correctly assessed. Preventing or mitigating the consequences of risks make them overall less expensive. Disruptions to operations can be reduced with good risk management. Stakeholders like clients or partners are also heartened by proactive risk management.

    What are the key principles of risk management?

    There are many different approaches to risk management, but the fundamental principles tend to stay the same: identify, assess and develop strategies to avoid and respond to risks. The principles of risk identification and assessment form the backbone: spotting and evaluating the likelihood of risks informs all the later aspects. Risk prioritization and treatment are the risk management principles most grounded in practical considerations for a company or network.

    Who should take this course on security and risk management?

    Security and risk management as a topic applies to nearly everyone who is connected to a business network, from the IT professionals who keep it running, to the non-technical professionals who use it, all the way to the managers, owners and entrepreneurs who own the network and carry the risks involved. It's not just cybersecurity professionals whose entire careers could be affected by the information available on this course.

    Who is this for?

    This Security and Risk Management training is considered foundational-level security training, which means it was designed for security technicians. This security best practices course is valuable for new IT professionals with at least a year of experience with security and risk management and experienced security technicians looking to validate their security skills.

    target-audience-face-6target-audience-face-3target-audience-face-9

    What our learners say

    • It feels like the best and the brightest people are training with you — and they are just hanging out with you and showing you the ropes.

      John McCann | IT manager and CBT Nuggets learner
    • CBT Nuggets is exactly what I needed.

      Thomas S. | Systems Engineer & Consultant
    • When learning a new technology, people sometimes build a wall that complicates the learning process because of the unknown. I like tearing down that wall — and having people fall in love with that technology.

      Lalo Nunez | CBT Nuggets trainer since 2020
    Study plan

    Download the free Security and Risk Management study plan to complete this course in about 1 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522