About the Course
Familiarity with the essential concepts associated with IT infrastructure and information security risk enables IT professionals to identify, evaluate, and prioritise security risks. In this course, you’ll get to know the terminologies, activities, and concepts associated with the security risk management process.
As you might expect, effective security risk management often begins with proper security risk identification. In the course, you’ll examine various components of the risk identification process and different techniques used to identify risk. You’ll explore the assessment, classification, and prioritisation of security risks. And you’ll identify the activities involved in the risk management process, the importance of risk strategies in the context of work environments, and essential decisions required for managing security risks effectively.