Cyber Security Risk Assessment & Management Training

Level: Foundation
Rating: 4.6/5 4.58/5 Based on 164 Reviews

This Cyber Security Risk Assessment and Management course will teach you how to how to conduct a security risk assessment to protect your organization. You will learn about the laws and regulations that impose strict cyber security requirements on all organizations, and gain the skills to develop a compliance assessment plan and employ a standards-based risk management process while maintaining a satisfactory security posture.

Key Features of this Risk Assessment and Management Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Implement standards-based, proven methodologies for assessing and managing the risks to your organization's information infrastructure
  • Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives
  • Extend security protection to Industrial Control Systems (ICS) and the cloud


CompTIA CPE 23 Credits

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


In Class & Live, Online Training

  • 4-day instructor-led training course
  • Earn 23 NASBA credits (live, in-class training only)
  • Earn 23 CompTIA CEUs
  • One-on-one after-course instructor coaching
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $2990 USD

Government $2659 USD




Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience


Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

Time Zone Legend:
Eastern Time Zone Central Time Zone
Mountain Time Zone Pacific Time Zone

Note: This course runs for 4 Days

  • Jan 18 - 21 9:00 AM - 4:30 PM EST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • May 10 - 13 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jul 19 - 22 9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.

Risk Assessment and Management Course Information

  • Prerequisites

    Attendees should have a basic knowledge of business processes and technology concepts. No specialized technical knowledge is assumed.

Risk Assessment and Management Course Outline

  • Introduction to Risk Assessment and Management

    • Ensuring compliance with applicable regulatory drivers
    • Protecting the organization from unacceptable losses
    • Describing the Risk Management Framework (RMF)
    • Applying NIST/ISO risk management processes
  • Characterizing System Security Requirements

    Defining the system

    • Outlining the system security boundary
    • Pinpointing system interconnections
    • Incorporating the unique characteristics of Industrial Control Systems (ICS) and cloud-based systems

    Identifying security risk components

    • Estimating the impact of compromises to confidentiality, integrity and availability
    • Adopting the appropriate model for categorizing system risk

    Setting the stage for successful risk management

    • Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
    • Appointing qualified individuals to risk governance roles
  • Selecting Appropriate Security Controls

    Assigning a security control baseline

    • Investigating security control families
    • Determining the baseline from system security risk

    Tailoring the baseline to fit the system

    • Examining the structure of security controls, enhancements and parameters
    • Binding control overlays to the selected baseline
    • Gauging the need for enhanced assurance
    • Distinguishing system-specific, compensating and non-applicable controls
  • Reducing Risk Through Effective Control Implementation

    Specifying the implementation approach

    • Maximizing security effectiveness by "building in" security
    • Reducing residual risk in legacy systems via "bolt-on" security elements

    Applying NIST/ISO controls

    • Enhancing system robustness through selection of evaluated and validated components
    • Coordinating implementation approaches to administrative, operational and technical controls
    • Providing evidence of compliance through supporting artifacts
  • Assessing Compliance Scope and Depth

    Developing an assessment plan

    • Prioritizing depth of control assessment
    • Optimizing validation through sequencing and consolidation
    • Verifying compliance through tests, interviews and examinations

    Formulating an authorization recommendation

    • Evaluating overall system security risk
    • Mitigating residual risks
    • Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation
  • Authorizing System Operation

    Aligning authority and responsibility

    • Quantifying organizational risk tolerance
    • Elevating authorization decisions in high-risk scenarios

    Forming a risk-based decision

    • Appraising system operational impact
    • Weighing residual risk against operational utility
    • Issuing Authority to Operate (ATO)
  • Maintaining Continued Compliance

    Justifying continuous reauthorization

    • Measuring impact of changes on system security posture
    • Executing effective configuration management
    • Performing periodic control reassessment

    Preserving an acceptable security posture

    • Delivering initial and routine follow-up security awareness training
    • Collecting on-going security metrics
    • Implementing vulnerability management, incident response and business continuity processes

Team Training

Risk Assessment and Management Training FAQs

  • What is cyber security risk assessment?

    Going through the process of identifying, analysing and evaluating risk. It helps to guarantee that the cybersecurity controls you are choosing are suitable for the risks your organization may face.

  • What is risk management in information security?

    Information security risk management is the process of managing risks associated with the use of information technology.

  • Can I learn cyber security risk assessment and management online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français