Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Life Purpose Meditation Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Blender
30-Day Money-Back Guarantee

This course includes:

  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Risk Management

Cyber Security Risk Management

A comprehensive overview of risk and management principles and practices as applied in a cyber security context.
Rating: 4.0 out of 54.0 (29 ratings)
120 students
Created by Andrew Stephen
Last updated 12/2019
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Develop an understanding of what risk is and how it can be managed.
  • How to create a risk management framework within your organisation.
  • How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.
  • How to perform detailed analysis of risk and develop risk treatment plans.
  • How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting.

Requirements

  • No special requirements.

Description

In this course you will gain a solid understanding of risk management principles, processes, frameworks and techniques that can be applied specifically to cyber security as well as risk in general.

You will learn how to identify, assess and articulate risk as well as options available for treating risk and which may be most appropriate for your situation.

This course also provides examples of tools and techniques as well as useful tips that can help you to successfully implement and maintain a risk management framework within your organization.

Who this course is for:

  • Information Technology Managers
  • Information/Cyber Security Managers
  • Information Security Professionals
  • Anyone with an interest in gaining a general understanding of risk management as well as how it applies to information security

Course content

4 sections • 52 lectures • 4h 7m total length

  • Preview01:50
  • What Is Risk?
    02:27
  • IT & Cyber Security Risk
    05:19
  • Components of a Risk
    03:06
  • Articulating Risk
    07:00

  • Preview01:30
  • Preview04:02
  • Preview07:25
  • Risk Management vs Risk Minimisation
    02:18
  • Risk Management Principles
    04:53
  • Risk Management Framework
    02:54
  • Mandate & Commitment
    03:50
  • Designing your framework
    01:04
  • Designing your framework – Organisational Context
    05:00
  • Designing your framework - Establish Policy
    03:38
  • Designing your framework - Accountability
    07:54
  • Designing your framework - Organisational Integration
    04:46
  • Designing your framework - Communication & Reporting
    04:14
  • Designing your framework - Implementation
    03:39
  • Designing your framework - Monitoring & Review
    05:10
  • Designing your framework - Continual Improvement
    01:04
  • The risk management process
    01:40
  • The risk management process - Communication & Consultation
    07:58
  • The risk management process - Context Establishment
    03:30
  • The risk management process - Risk Assessment
    04:01
  • The risk management process - Risk Treatment
    08:28
  • The risk management process - Monitoring & Review
    06:11
  • The risk management process - Auditability and Traceability
    02:11
  • Risk Management - Maturity Models
    02:49
  • Risk Management - Risk Assessment & Measurement
    01:01

  • Introduction
    01:18
  • Risk Assessment & Measurement - Terminology
    03:39
  • The risk management process (recap)
    01:10
  • Risk Identification (Part 1)
    09:30
  • Risk Identification (Part 2)
    06:56
  • Risk Identification (Part 3)
    05:36
  • Risk Analysys
    04:13
  • Risk Analysis - Likelihood
    02:46
  • Risk Analysis - Consequence/Impact
    03:16
  • Risk Analysis - Consequence Examples
    07:38
  • Risk Analysis - Risk Matrix
    05:56
  • Risk Analysis - Analysis Example (1)
    08:55
  • Risk Analysis - Analysis Example (2)
    05:52
  • Risk Evaluation
    03:29
  • Risk Treatment
    03:34
  • Risk Treatment Plan Example (1)
    09:57
  • Risk Treatment Considerations
    02:52

  • Introduction
    01:05
  • Creating an IT risk register
    01:47
  • Example Excel risk register
    24:42
  • Risk governance - 3 lines of defence model
    05:36
  • Risk bowties
    07:03

Instructor

Andrew Stephen
Accomplished information security manager and consultant
Andrew Stephen
  • 4.0 Instructor Rating
  • 29 Reviews
  • 120 Students
  • 1 Course

A highly experienced information security consultant and manager with diverse experience across multiple industries and organizations of various sizes. Combining a highly technical background with solid communication and presentation skills provides the ability to translate complex concepts into easy to understand, plain English terms.

Various roles undertaken include information security management, architecture, consulting, governance, risk management, project management, auditing, vendor management and operations.

Tertiary qualifications include a Master of Information Systems Security, Bachelor of Science and Diploma in Education.

Industry certifications include CISM, CRISC, CISA, CISSP, CCIH, Security+, MCSE, MCT, Microsoft Azure, Amazon Web Services, ITIL, Citrix and PRINCE2.

Living in Sydney, Australia with wife and two children.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.