This Cyber Security Risk Assessment and Management course will teach you how to how to conduct a security risk assessment to protect your organization. You will learn about the laws and regulations that impose strict cyber security requirements on all organizations, and gain the skills to develop a compliance assessment plan and employ a standards-based risk management process while maintaining a satisfactory security posture.
TRAINING AT YOUR SITE
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
Nov 27 - 30
9:00 AM - 4:30 PM EST Rockville, MD / Online (AnyWare) Reserve Your Seat
Jan 22 - 25
9:00 AM - 4:30 PM EST New York / Online (AnyWare) Reserve Your Seat
Mar 5 - 8
9:00 AM - 4:30 PM EST Ottawa / Online (AnyWare) Reserve Your Seat
Apr 9 - 12
9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Reserve Your Seat
May 28 - 31
9:00 AM - 4:30 PM EDT Rockville, MD / Online (AnyWare) Reserve Your Seat
Jul 16 - 19
9:00 AM - 4:30 PM EDT New York / Online (AnyWare) Reserve Your Seat
Sep 3 - 6
9:00 AM - 4:30 PM EDT Ottawa / Online (AnyWare) Reserve Your Seat
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.
Attendees should have a basic knowledge of business processes and technology concepts. No specialized technical knowledge is assumed.
Defining the system
Identifying security risk components
Setting the stage for successful risk management
Assigning a security control baseline
Tailoring the baseline to fit the system
Specifying the implementation approach
Applying NIST/ISO controls
Developing an assessment plan
Formulating an authorization recommendation
Aligning authority and responsibility
Forming a risk-based decision
Justifying continuous reauthorization
Preserving an acceptable security posture
Going through the process of identifying, analysing and evaluating risk. It helps to guarantee that the cybersecurity controls you are choosing are suitable for the risks your organization may face.
Information security risk management is the process of managing risks associated with the use of information technology.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.
System and Network Security Introduction TrainingVulnerability Assessment Training: Protecting Your OrganizationDisaster Recovery Planning: Ensuring Business ContinuityInfluence Skills: Getting Results without Direct AuthorityPenetration Testing Training: Tools and TechniquesDefending the Perimeter from Cyber Attacks TrainingEndpoint Security and Network Access Control TrainingSocial Engineering Training: Deceptions and DefensesCISSP Training and Certification Exam PreparationCompTIA Security+ Certification TrainingCOBIT® 5 Foundation
Your Training Comes with a 100% Satisfaction Guarantee!*
*Partner-delivered courses may have different terms that apply. Ask for details.