Loren Saxton
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Effective security risk management often begins with proper security risk identification. In this course, you'll examine various components of the risk identification process and different techniques used to identify risk.
You'll begin by distinguishing between threat and risk. You'll then get familiar with other terminologies and concepts associated with risk identification.
Moving on, you'll recognize the significance of risk identification in recognizing assets and services that are risk-prone. You'll also investigate different methods used to identify risk and best practices for the risk identification process.
Later in the course, you'll outline common security-related risks and their impact on different components of an organization. Finally, you'll examine the features of a security risk register, its role in risk management, and how to create one in Microsoft Excel.
Issued on
February 22, 2024
Expires on
Does not expire