IT Risk Management

An introductory course about understanding IT Risk Management and the different components that make up ECM solutions.
3.3 (13 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
271 students enrolled
$50
Take This Course
  • Lectures 88
  • Contents Video: 3 hours
    Other: 4 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2014 English

Course Description

IT risk management is the application of risk management to Information technology context in order to manage IT risk such as the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.

Varying definitions of risk management will be explained in this course as well as the different methodologies that exist to manage IT risks. Each of them is broken down into processes and steps. This course will also give an overview of IT risk and risk management as an introduction to the lessons.

What are the requirements?

  • Basic understanding of the IT industry
  • Knowledge of the English language

What am I going to get from this course?

  • Have an overview of both IT Risk and Risk Management.
  • Be introduced to IT Risk Management.
  • Be aware of the four components of Risk Management Methodology.
  • To understand Risk IT.

What is the target audience?

  • Businesses wanting to reduce and manage IT risks, to IT managers wanting to learn about risk management processes, and to IT professionals investigating IT risk methodologies.
  • IT practitioners who need to develop their skills that are crucial, as businesses embark on this massive transformation.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: IT Risk
00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 2: Introduction to IT Risk

Lecture 3: Definitions of IT Risk

Lecture 4: Four "A"s

Lecture 5: IT Risk Disciplines

Lecture 6: Cause of IT Risk

Lecture 7: Ineffective and Inadequate IT Governance

Lecture 8: Effective IT Governance

02:24

This lecture will provide an overview of IT Risk.

.

Lecture outline:

0:00    Introduction to IT Risk
1:09    What is IT Risk?
03:21

This lecture will talk about the different definitions of IT Risk.

.

Lecture outline:

0:00    ISO/IEC
0:21    NIST
1:14    FAIR
1:25    The Committee on National
        Security Systems
2:20    Risk defined by The National
        Information Assurance Training
        and Education Center
00:35

This lecture will explain the four "As" of IT Risk.

00:43

This lecture will discuss the disciplines of IT Risk.

00:53

This lecture will cover the cause of IT Risk.

02:21

This lecture will identify the ineffectiveness and inadequacy of IT Governance.

.

Lecture outline:

0:00    Definition of IT Governance
0:52    Inadequate IT Governance
03:57

This discussion will focus on the effectiveness of IT Governance.

.

Lecture outline:

0:00    Introduction to Effective IT Goverenance
0:16    Uncontrolled Complexity
1:08    Inattention to Risk
2:46    Conclusion
Section 1 - Quiz
6 questions
8 pages

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Section 2: Risk Management
00:25

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 11: Risk Management

Lecture 12: Risk Management Procedures

Lecture 13: Risk Management Methods

Lecture 14: Risk Management Principles

Lecture 15: Risk Management Process

Lecture 16: Importance of Risk Management

Lecture 17: Information Security

Lecture 18: System Development Lifecycle

04:08

This lecture will talk about Risk Management.

.

Lecture outline:

0:00    Definition of Risk Management
1:31    Other Definitions of Risk Management
3:34    Probability and Consequence
01:30

This lecture will identify the different procedures of Risk Management.

00:43

This discussion will focus on the methods of Risk Management.

01:01

This lecture will identify the different principles of Risk Management.

03:49

This lecture will discuss the process of Risk Management.

.

Lecture outline:

0:00    Introduction to the Risk Management Process
0:14    Identify the Risks
0:47    Identify the Causes
1:20    Identify the Controls
2:01    Establish your Likelihood and Consequence Descriptors
2:38    Establish your Risk Rating Descriptors
2:56    Add Other Controls
3:13    Make a Decision
3:36    Monitor and Review
01:50

This lecture will talk about the importance of Risk Management.

03:03

This lecture will explain information security.

02:27

This discussion will center on the lifecycle of system development.

Section 2 - Quiz
6 questions
11 pages

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Section 3: Introduction to IT Risk Management
00:35

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 21: Risk Management

Lecture 22: IT Risk Management Issues

Lecture 23: Failure of Risk Management in IT

Lecture 24: Effective IT Risk Management

Lecture 25: Step One: Identify

Lecture 26: Step Two: Access

Lecture 27: Step Three: Remediate IT Risks

Lecture 28: Step Four: Manage

Lecture 29: Conclusion

05:28

This discussion will focus on the overview of Risk Management.

08:04

This lecture will explain some issues involving IT Risk management.

.

Lecture outline:

0:00    Introduction to Overlooked IT Risk Management Issues
0:33    Key Personnel Losses in User Areas
1:08    Merger and Acquisition Fallout
2:04    Poor Communications
2:51    Carelessness with Vendors
3:34    Board Engagement in Decision-Making
4:15    Distributed Servers in Remote Locations
4:57    Expert Knowledge Hoarding
5:58    Employee Dating and Spouses
6:38    Lack of Documentation
7:19    Your Disaster Recovery Plan
07:55

This lecture will talk about why Risk Management fails in IT.

.

Lecture outline:

0:00    Introduction to Why Risk Management Fails in IT
1:28    Expensive and Impossible to Identify
2:29    Impossible to Assign Value
4:09    Wrong Predictions of Actual Disasters
6:15    Devolves to "protect everything"
02:19

This lecture will discuss effective IT Risk management and the steps you can take to ensure its effectivity.

03:02

This discussion will focus on step one of effective IT Risk management, namely identify.

.

Lecture outline:

0:00    Introduction to Identify
0:33    Data Confidentiality
1:01    Data Integrity Risk
1:47    Relevance Risk
2:07    Project Risk
2:26    What's Next?
01:23

This discussion will focus on step two of effective IT Risk management, namely access.

01:40

This discussion will focus on step three of effective IT Risk management, namely remediate IT Risks.

02:39

This discussion will focus on step four of effective IT Risk management, namely manage.

01:01

This lecture will give a conclusion on the effectiveness of IT Risk management.

Section 3 - Quiz
6 questions
16 pages

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Section 4: Risk Management Methodology (Part 1)
00:28

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 32: Types of Content Management System

Lecture 33: Risk Management Process

Lecture 34: Process: Frame

Lecture 35: Input and Preconditions

Lecture 36: Feedback and Risk Assumptions

Lecture 37: Consequences and Impact

Lecture 38: Likelihood and Risk Constraints

Lecture 39: Risk Tolerance and Priorities / Tradeoffs

Lecture 40: Output and Post Conditions

01:40

This lecture will provide an overview of the process of Risk Management.

.

Lecture outline:

0:00    Methodology Defined
0:27    Risk Assessment Defined
0:58    Introduction to the Risk Management Process
02:32

This lecture will discuss the first process of Risk Management, namely frame.

01:15

This discussion will focus on the input and preconditions of the framing process.

04:27

This lecture will talk about the feedback and risk assumptions involved in the framing process.

05:56

This discussion will address the threats and vulnerabilities involved in the framing process.

02:40

This discussion will center on the consequences and impact involved in the framing process.

04:40

This lecture will talk about likelihood and risk constraints involved in the framing process.

.

Lecture outline:

0:00    Likelihood
2:12    Risk Constraints
02:46

This lecture will explain the risk tolerance and priorities involved in the framing process.

.

Lecture outline:

0:00    Risk Tolerance
1:29    Priorities and Tradeoffs
01:40

This lecture will discuss the output and post conditions involved in the framing process.

Section 4 - Quiz
6 questions
13 pages

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Section 5: Risk Management Methodology (Part 2)
00:29

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 43: Risk Management Process

Lecture 44: Process: Assets

Lecture 45: Input and Preconditions

Lecture 46: Risk Determination and Uncertainty

Lecture 47: Threat and Vulnerability Identification

Lecture 48: Output and Post Conditions

Lecture 49: Process: Respond

Lecture 50: Input and Preconditions

Lecture 51: Risk Acceptance, Avoidance and Mitigation

Lecture 52: Risk Share or Transfer

Lecture 53: Evaluations and Alternatives

Lecture 54: Risk Response Decision and Implementation

00:14

This lecture will provide an overview of the process of Risk Management.

04:30

This lecture will discuss the second process of Risk Management, namely assets.

02:31

This lecture will explain the input and preconditions involved in the assets process.

03:58

This lecture will discuss risk determination and uncertainty involved in the assets process.

05:22

This discussion will focus on the threat and vulnerability involved in the assets process.

03:27

This discussion will center on the output and post conditions involved in the assets process.

01:54

This lecture will discuss the third process of Risk Management, namely respond.

02:22

This lecture will talk about the input and preconditions involved in the respond process.

05:48

This lecture will explain the risk acceptance, avoidance, and mitigation involved in the respond process.

.

Lecture outline:

0:00    Risk Response Identification
1:25    Risk Acceptance
3:15    Risk Avoidance
4:23    Risk Mitigation
01:55

This lecture will discuss risk shares involved in the respond process.

04:43

This discussion will focus on the evaluations and alternatives involved in the respond process.

04:18

This discussion will center on the risk response decision and implementation involved in the respond process.

.

Lecture outline:

0:00    Risk Response Decision
1:17    Risk Response Implementation
2:10    Output and Post Conditions
Section 5 - Quiz
6 questions
18 pages

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Section 6: Risk Management Methodology (Part 3)
00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 57: Risk Management Process

Lecture 58: Process: Monitor

Lecture 59: Input and Preconditions

Lecture 60: Risk Monitoring Strategy

Lecture 61: Monitoring Compliance, Effectiveness and Changes

Lecture 62: Automated vs Manual Monitoring

Lecture 63: Monitoring Frequency

Lecture 64: Risk Monitoring

Lecture 65: Output and Post Conditions

00:10

This lecture will provide an overview of the process of Risk Management.

02:16

This lecture will discuss the fourth process of Risk Management, namely monitor.

01:15

This lecture will explain input and preconditions involved in the monitor process.

01:52

This discussion will focus on the risk monitoring strategy involved in the monitor process.

07:33

This lecture will discuss monitoring compliance, effectiveness, and changes involved in the monitor process.

.

Lecture outline:

0:00    Monitoring Compliance
2:16    Monitoring Effectiveness
5:04    Monitoring Changes
02:06

This lecture will explain the difference between automated and manual monitoring in the monitor process.

01:52

This lecture will discuss the monitoring frequency involved in the monitor process.

01:37

This discussion will focus on keeping track of risk involved in the monitor process.

01:31

This lecture will talk about the output and post conditions involved in the monitor process.

Section 6 - Quiz
6 questions
10 pages

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Section 7: Risk IT
00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 68: Risk IT

Lecture 69: Risk IT Principles

Lecture 70: Connect to Business Objectives

Lecture 71: Align IT Risk Management with ERM

Lecture 72: Balance Cost / Benefit of IT Risk

Lecture 73: Promote Fair and Open Communication

Lecture 74: Establish Tone at the Top and Accountability

Lecture 75: Function as Part of Daily Activities

Lecture 76: What Does Risk IT do?

Lecture 77: Benefits of Risk IT

Lecture 78: Risk IT Framework

Lecture 79: Framework: Risk Governance

Lecture 80: Framework: Risk Evaluation

Lecture 81: Framework: Risk Response

01:32

This lecture will explain and define Risk IT.

00:57

This lecture will identify the different principles of Risk IT.

01:01

This discussion will focus on the business objectives involved in Risk IT.

00:50

This lecture will discuss the alignment of IT Risk management with ERM.

00:30

This lecture will identify the benefits of IT risk.

00:32

This lecture will talk about promoting fair and open communication involved in Risk IT.

01:17

This lecture will explain establishing tone and accountability in Risk IT.

01:30

This lecture will discuss the function of Risk IT as part of daily activities.

00:45

This discussion will focus on what Risk IT does.

00:56

This lecture will identify the different benefits of Risk IT.

01:09

This discussion will focus on the frameworks involved in Risk IT.

07:54

This lecture will discuss one of the frameworks of Risk IT, specifically risk governance.

.

Lecture outline:

0:00    Introduction to the Risk Governance Process
0:18    Risk Governance Essentials
0:44    Risk Appetite
1:39    Guidance that applies to both Risk Appetite and Risk Tolerance
4:21    Responsibility and Accountability
4:55    Awareness and Communication
6:46    Risk Culture
02:07

This lecture will discuss one of the frameworks of Risk IT, specifically risk evaluation.

.

Lecture outline:

0:00    Introduction to the Risk Evaluation Process
0:14    Risk Evaluation Essentials
0:32    Describing Business Impact
1:26    IT Risk Scenarios
08:52

This lecture will discuss one of the frameworks of Risk IT, specifically risk response.

.

Lecture outline:

0:00    Introduction to the Risk Response Process
0:09    Risk Response Essentials
0:30    Key Risk Indicators (KRI)
2:35    Benefits of Key Risk Indicators
3:23    Problems when facing KRIs
4:30    Risk Response Definition
4:47    Risk Avoidance
5:36    Risk Reduction / Mitigation
6:13    Risk Sharing / Transfer
4:47    Risk Acceptance
5:36    Risk Reduction / Mitigation
5:54    Risk Acceptance
Section 7 - Quiz
6 questions
16 pages

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Section 8: Course Resources
136 pages

This e book contains the entire IT Risk Management course in a PDF format.

2 pages

This e book is a list of terms and definitions often used in the field of IT Risk Management.

7 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The Art Of Service, Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.

Ready to start learning?
Take This Course