IT Risk Management
4.0 (22 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
359 students enrolled
Wishlisted Wishlist

Please confirm that you want to add IT Risk Management to your Wishlist.

Add to Wishlist

IT Risk Management

An introductory course about understanding IT Risk Management and the different components that make up ECM solutions.
4.0 (22 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
359 students enrolled
Last updated 3/2015
English
Current price: $10 Original price: $50 Discount: 80% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • 1 min on-demand audio
  • 12 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Have an overview of both IT Risk and Risk Management.
  • Be introduced to IT Risk Management.
  • Be aware of the four components of Risk Management Methodology.
  • To understand Risk IT.
View Curriculum
Requirements
  • Basic understanding of the IT industry
  • Knowledge of the English language
Description

IT risk management is the application of risk management to Information technology context in order to manage IT risk such as the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.

Varying definitions of risk management will be explained in this course as well as the different methodologies that exist to manage IT risks. Each of them is broken down into processes and steps. This course will also give an overview of IT risk and risk management as an introduction to the lessons.

Who is the target audience?
  • Businesses wanting to reduce and manage IT risks, to IT managers wanting to learn about risk management processes, and to IT professionals investigating IT risk methodologies.
  • IT practitioners who need to develop their skills that are crucial, as businesses embark on this massive transformation.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
88 Lectures
07:08:40
+
IT Risk
9 Lectures 14:40

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 2: Introduction to IT Risk

Lecture 3: Definitions of IT Risk

Lecture 4: Four "A"s

Lecture 5: IT Risk Disciplines

Lecture 6: Cause of IT Risk

Lecture 7: Ineffective and Inadequate IT Governance

Lecture 8: Effective IT Governance

Preview 00:26

This lecture will provide an overview of IT Risk.

.

Lecture outline:

0:00    Introduction to IT Risk
1:09    What is IT Risk?
Preview 02:24

This lecture will talk about the different definitions of IT Risk.

.

Lecture outline:

0:00    ISO/IEC
0:21    NIST
1:14    FAIR
1:25    The Committee on National
        Security Systems
2:20    Risk defined by The National
        Information Assurance Training
        and Education Center
Preview 03:21

This lecture will explain the four "As" of IT Risk.

Preview 00:35

This lecture will discuss the disciplines of IT Risk.

Preview 00:43

This lecture will cover the cause of IT Risk.

Cause of IT Risk
00:53

This lecture will identify the ineffectiveness and inadequacy of IT Governance.

.

Lecture outline:

0:00    Definition of IT Governance
0:52    Inadequate IT Governance
Ineffective and Inadequate IT Governance
02:21

This discussion will focus on the effectiveness of IT Governance.

.

Lecture outline:

0:00    Introduction to Effective IT Goverenance
0:16    Uncontrolled Complexity
1:08    Inattention to Risk
2:46    Conclusion
Effective IT Governance
03:57

Section 1 - Quiz
6 questions

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 1
8 pages
+
Risk Management
10 Lectures 18:56

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 11: Risk Management

Lecture 12: Risk Management Procedures

Lecture 13: Risk Management Methods

Lecture 14: Risk Management Principles

Lecture 15: Risk Management Process

Lecture 16: Importance of Risk Management

Lecture 17: Information Security

Lecture 18: System Development Lifecycle

Preview 00:25

This lecture will talk about Risk Management.

.

Lecture outline:

0:00    Definition of Risk Management
1:31    Other Definitions of Risk Management
3:34    Probability and Consequence
Risk Management
04:08

This lecture will identify the different procedures of Risk Management.

Risk Management Procedures
01:30

This discussion will focus on the methods of Risk Management.

Risk Management Methods
00:43

This lecture will identify the different principles of Risk Management.

Risk Management Principles
01:01

This lecture will discuss the process of Risk Management.

.

Lecture outline:

0:00    Introduction to the Risk Management Process
0:14    Identify the Risks
0:47    Identify the Causes
1:20    Identify the Controls
2:01    Establish your Likelihood and Consequence Descriptors
2:38    Establish your Risk Rating Descriptors
2:56    Add Other Controls
3:13    Make a Decision
3:36    Monitor and Review
Risk Management Process
03:49

This lecture will talk about the importance of Risk Management.

Importance of Risk Management
01:50

This lecture will explain information security.

Information Security
03:03

This discussion will center on the lifecycle of system development.

System Development Lifecycle
02:27

Section 2 - Quiz
6 questions

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 2
11 pages
+
Introduction to IT Risk Management
11 Lectures 34:06

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 21: Risk Management

Lecture 22: IT Risk Management Issues

Lecture 23: Failure of Risk Management in IT

Lecture 24: Effective IT Risk Management

Lecture 25: Step One: Identify

Lecture 26: Step Two: Access

Lecture 27: Step Three: Remediate IT Risks

Lecture 28: Step Four: Manage

Lecture 29: Conclusion

Preview 00:35

This discussion will focus on the overview of Risk Management.

Risk Management
05:28

This lecture will explain some issues involving IT Risk management.

.

Lecture outline:

0:00    Introduction to Overlooked IT Risk Management Issues
0:33    Key Personnel Losses in User Areas
1:08    Merger and Acquisition Fallout
2:04    Poor Communications
2:51    Carelessness with Vendors
3:34    Board Engagement in Decision-Making
4:15    Distributed Servers in Remote Locations
4:57    Expert Knowledge Hoarding
5:58    Employee Dating and Spouses
6:38    Lack of Documentation
7:19    Your Disaster Recovery Plan
IT Risk Management Issues
08:04

This lecture will talk about why Risk Management fails in IT.

.

Lecture outline:

0:00    Introduction to Why Risk Management Fails in IT
1:28    Expensive and Impossible to Identify
2:29    Impossible to Assign Value
4:09    Wrong Predictions of Actual Disasters
6:15    Devolves to "protect everything"
Failure of Risk Management in IT
07:55

This lecture will discuss effective IT Risk management and the steps you can take to ensure its effectivity.

Effective IT Risk Management
02:19

This discussion will focus on step one of effective IT Risk management, namely identify.

.

Lecture outline:

0:00    Introduction to Identify
0:33    Data Confidentiality
1:01    Data Integrity Risk
1:47    Relevance Risk
2:07    Project Risk
2:26    What's Next?
Step One: Identify
03:02

This discussion will focus on step two of effective IT Risk management, namely access.

Step Two: Access
01:23

This discussion will focus on step three of effective IT Risk management, namely remediate IT Risks.

Step Three: Remediate IT Risks
01:40

This discussion will focus on step four of effective IT Risk management, namely manage.

Step Four: Manage
02:39

This lecture will give a conclusion on the effectiveness of IT Risk management.

Conclusion
01:01

Section 3 - Quiz
6 questions

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 3
16 pages
+
Risk Management Methodology (Part 1)
11 Lectures 28:04

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 32: Types of Content Management System

Lecture 33: Risk Management Process

Lecture 34: Process: Frame

Lecture 35: Input and Preconditions

Lecture 36: Feedback and Risk Assumptions

Lecture 37: Consequences and Impact

Lecture 38: Likelihood and Risk Constraints

Lecture 39: Risk Tolerance and Priorities / Tradeoffs

Lecture 40: Output and Post Conditions

Preview 00:28

This lecture will provide an overview of the process of Risk Management.

.

Lecture outline:

0:00    Methodology Defined
0:27    Risk Assessment Defined
0:58    Introduction to the Risk Management Process
Risk Management Process
01:40

This lecture will discuss the first process of Risk Management, namely frame.

Process: Frame
02:32

This discussion will focus on the input and preconditions of the framing process.

Input and Preconditions
01:15

This lecture will talk about the feedback and risk assumptions involved in the framing process.

Feedback and Risk Assumptions
04:27

This discussion will address the threats and vulnerabilities involved in the framing process.

Threat Sources and Vulnerabilities
05:56

This discussion will center on the consequences and impact involved in the framing process.

Consequences and Impact
02:40

This lecture will talk about likelihood and risk constraints involved in the framing process.

.

Lecture outline:

0:00    Likelihood
2:12    Risk Constraints
Likelihood and Risk Constraints
04:40

This lecture will explain the risk tolerance and priorities involved in the framing process.

.

Lecture outline:

0:00    Risk Tolerance
1:29    Priorities and Tradeoffs
Risk Tolerance and Priorities / Tradeoffs
02:46

This lecture will discuss the output and post conditions involved in the framing process.

Output and Post Conditions
01:40

Section 4 - Quiz
6 questions

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 4
13 pages
+
Risk Management Methodology (Part 2)
14 Lectures 41:31

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 43: Risk Management Process

Lecture 44: Process: Assets

Lecture 45: Input and Preconditions

Lecture 46: Risk Determination and Uncertainty

Lecture 47: Threat and Vulnerability Identification

Lecture 48: Output and Post Conditions

Lecture 49: Process: Respond

Lecture 50: Input and Preconditions

Lecture 51: Risk Acceptance, Avoidance and Mitigation

Lecture 52: Risk Share or Transfer

Lecture 53: Evaluations and Alternatives

Lecture 54: Risk Response Decision and Implementation

Preview 00:29

This lecture will provide an overview of the process of Risk Management.

Risk Management Process
00:14

This lecture will discuss the second process of Risk Management, namely assets.

Process: Assets
04:30

This lecture will explain the input and preconditions involved in the assets process.

Input and Preconditions
02:31

This lecture will discuss risk determination and uncertainty involved in the assets process.

Risk Determination and Uncertainty
03:58

This discussion will focus on the threat and vulnerability involved in the assets process.

Threat and Vulnerability Identification
05:22

This discussion will center on the output and post conditions involved in the assets process.

Output and Post Conditions
03:27

This lecture will discuss the third process of Risk Management, namely respond.

Process: Respond
01:54

This lecture will talk about the input and preconditions involved in the respond process.

Input and Preconditions
02:22

This lecture will explain the risk acceptance, avoidance, and mitigation involved in the respond process.

.

Lecture outline:

0:00    Risk Response Identification
1:25    Risk Acceptance
3:15    Risk Avoidance
4:23    Risk Mitigation
Risk Acceptance, Avoidance and Mitigation
05:48

This lecture will discuss risk shares involved in the respond process.

Risk Share or Transfer
01:55

This discussion will focus on the evaluations and alternatives involved in the respond process.

Evaluations and Alternatives
04:43

This discussion will center on the risk response decision and implementation involved in the respond process.

.

Lecture outline:

0:00    Risk Response Decision
1:17    Risk Response Implementation
2:10    Output and Post Conditions
Risk Response Decision and Implementation
04:18

Section 5 - Quiz
6 questions

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 5
18 pages
+
Risk Management Methodology (Part 3)
11 Lectures 20:38

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 57: Risk Management Process

Lecture 58: Process: Monitor

Lecture 59: Input and Preconditions

Lecture 60: Risk Monitoring Strategy

Lecture 61: Monitoring Compliance, Effectiveness and Changes

Lecture 62: Automated vs Manual Monitoring

Lecture 63: Monitoring Frequency

Lecture 64: Risk Monitoring

Lecture 65: Output and Post Conditions

Preview 00:26

This lecture will provide an overview of the process of Risk Management.

Risk Management Process
00:10

This lecture will discuss the fourth process of Risk Management, namely monitor.

Process: Monitor
02:16

This lecture will explain input and preconditions involved in the monitor process.

Input and Preconditions
01:15

This discussion will focus on the risk monitoring strategy involved in the monitor process.

Risk Monitoring Strategy
01:52

This lecture will discuss monitoring compliance, effectiveness, and changes involved in the monitor process.

.

Lecture outline:

0:00    Monitoring Compliance
2:16    Monitoring Effectiveness
5:04    Monitoring Changes
Monitoring Compliance, Effectiveness and Changes
07:33

This lecture will explain the difference between automated and manual monitoring in the monitor process.

Automated vs Manual Monitoring
02:06

This lecture will discuss the monitoring frequency involved in the monitor process.

Monitoring Frequency
01:52

This discussion will focus on keeping track of risk involved in the monitor process.

Risk Monitoring
01:37

This lecture will talk about the output and post conditions involved in the monitor process.

Output and Post Conditions
01:31

Section 6 - Quiz
6 questions

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 6
10 pages
+
Risk IT
16 Lectures 30:18

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 68: Risk IT

Lecture 69: Risk IT Principles

Lecture 70: Connect to Business Objectives

Lecture 71: Align IT Risk Management with ERM

Lecture 72: Balance Cost / Benefit of IT Risk

Lecture 73: Promote Fair and Open Communication

Lecture 74: Establish Tone at the Top and Accountability

Lecture 75: Function as Part of Daily Activities

Lecture 76: What Does Risk IT do?

Lecture 77: Benefits of Risk IT

Lecture 78: Risk IT Framework

Lecture 79: Framework: Risk Governance

Lecture 80: Framework: Risk Evaluation

Lecture 81: Framework: Risk Response

Preview 00:26

This lecture will explain and define Risk IT.

Risk IT
01:32

This lecture will identify the different principles of Risk IT.

Risk IT Principles
00:57

This discussion will focus on the business objectives involved in Risk IT.

Connect to Business Objectives
01:01

This lecture will discuss the alignment of IT Risk management with ERM.

Align IT Risk Management with ERM
00:50

This lecture will identify the benefits of IT risk.

Balance Cost / Benefit of IT Risk
00:30

This lecture will talk about promoting fair and open communication involved in Risk IT.

Promote Fair and Open Communication
00:32

This lecture will explain establishing tone and accountability in Risk IT.

Establish Tone at the Top and Accountability
01:17

This lecture will discuss the function of Risk IT as part of daily activities.

Function as Part of Daily Activities
01:30

This discussion will focus on what Risk IT does.

What Does Risk IT do?
00:45

This lecture will identify the different benefits of Risk IT.

Benefits of Risk IT
00:56

This discussion will focus on the frameworks involved in Risk IT.

Risk IT Framework
01:09

This lecture will discuss one of the frameworks of Risk IT, specifically risk governance.

.

Lecture outline:

0:00    Introduction to the Risk Governance Process
0:18    Risk Governance Essentials
0:44    Risk Appetite
1:39    Guidance that applies to both Risk Appetite and Risk Tolerance
4:21    Responsibility and Accountability
4:55    Awareness and Communication
6:46    Risk Culture
Framework: Risk Governance
07:54

This lecture will discuss one of the frameworks of Risk IT, specifically risk evaluation.

.

Lecture outline:

0:00    Introduction to the Risk Evaluation Process
0:14    Risk Evaluation Essentials
0:32    Describing Business Impact
1:26    IT Risk Scenarios
Framework: Risk Evaluation
02:07

This lecture will discuss one of the frameworks of Risk IT, specifically risk response.

.

Lecture outline:

0:00    Introduction to the Risk Response Process
0:09    Risk Response Essentials
0:30    Key Risk Indicators (KRI)
2:35    Benefits of Key Risk Indicators
3:23    Problems when facing KRIs
4:30    Risk Response Definition
4:47    Risk Avoidance
5:36    Risk Reduction / Mitigation
6:13    Risk Sharing / Transfer
4:47    Risk Acceptance
5:36    Risk Reduction / Mitigation
5:54    Risk Acceptance
Framework: Risk Response
08:52

Section 7 - Quiz
6 questions

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 7
16 pages
+
Course Resources
3 Lectures 00:00

This e book contains the entire IT Risk Management course in a PDF format.

IT Risk Management Complete Certification Kit Book
136 pages

This e book is a list of terms and definitions often used in the field of IT Risk Management.

IT Risk Management Glossary of Terms
2 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Quiz Answer Sheet
7 pages
+
IT Risk Management Certification
3 Lectures 01:27

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

Final Exam
1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

Evaluation Form
1 page

A final message from our CEO.

Conclusion - Final Lecture
01:27
About the Instructor
The Art Of Service
3.6 Average rating
481 Reviews
5,230 Students
57 Courses
Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.