Skip to main content

Cyber Security Risk Assessment Training

Code: 2013 Category: Tag:

This Cybersecurity Risk Assessment and Management course will teach you how to conduct a security risk assessment to protect your organization. You will learn about the laws and regulations that impose strict cybersecurity requirements on all organizations and gain the skills to develop a compliance assessment plan and employ a standards-based risk management process while maintaining a satisfactory security posture.

Attendees should have a basic knowledge of business processes and technology concepts. No specialized technical knowledge is assumed.

Cybersecurity Risk Assessment & Management Training Delivery Methods

In-Person

Online

Cybersecurity Risk Assessment & Management Training Information

In this Risk Assessment training, you will learn how to:

Implement standards-based, proven methodologies for assessing and managing the risks to your organization’s information infrastructure.
Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives.
Extend security protection to Industrial Control Systems (ICS) and the cloud.
Cyber Security Risk Assessment & Management Course Outline
Module 1: Introduction to Risk Assessment and Management
Ensuring compliance with applicable regulatory drivers
Protecting the organization from unacceptable losses
Describing the Risk Management Framework (RMF)
Applying NIST/ISO risk management processes
Module 2: Characterizing System Security Requirements
Module 3: Selecting Appropriate Security Controls
Module 4: Reducing Risk Through Effective Control Implementation
Module 5: Assessing Compliance Scope and Depth
Module 6: Authorizing System Operation
Module 7: Maintaining Continued Compliance

Request Quotes

Register now

Digital Media Forensics Essentials Labs

NICE Cybersecurity Workforce Framework Workshop

Advanced Developing on AWS

Ethereum Training: Hands-on Ethereum Development Bootcamp

Advanced Visualization with Power BI Training

Red Hat System Administration II (RH134)

Are you ready for the EU GDPR?

Penetration Testing & Network Exploitation Labs

EC-Council Certified Application Security Engineer (CASE) Java

.NET Web Services Training: WCF, Web API and SignalR

arالعربية