Learners in this course will learn how to identify common information security risk analysis methodologies, their characteristics, pros and cons, and applications. Learners will examine the sources of risk, including external malicious attackers, intentional and accidental attacks by internal users, and threats from environmentals and structural sources. Learners will also identify vulnerabilities in hardware, software, locations, and procedures that provide an opening to attackers and create risk to organizations. Learners will be able to demonstrate risk assessment techniques through hands-on application of software vulnerability testing tools.
Identifying and Managing Risk
$0.00
Course: 40 Hours