Overview

The concept of risk is central to cyber security and developing an understanding of the exposure of the system to different threats enables security efforts to be prioritized. By determining risk and exposure, security can be managed and cost-benefit decisions can be made. This course explores the principles and tools … For more content click the Read More button below. Students will: Understand Risk Management FundamentalsThreats, Vulnerabilities, and ExploitsComplianceDevelop a Risk Management PlanDefine various Risk Assessment ApproachesPerform a Risk AssessmentIdentify Assets and Activities to be ProtectedIdentify and Analyze Threats, Vulnerabilities, and ExploitsIdentify and Analyze Risk Mitigation Security ControlsPlanning Risk MitigationMitigate Risk with a Business Impact Analysis , Business Continuity Plan and a Computer Incident Response Team Plan.

Delivery

Fully online - Standard (usually weekly or fortnightly)

Fees

Pre-2019 Handbook Editions

Access past handbook editions (2018 and prior)