Managing Risk in Information Systems Training

Introduction:

Managing Risk in Information Systems Training Course hands-on

This Managing Risk in Information Systems Training course provides a unique, in-depth look at how to manage and reduce IT-associated risks. You will learn about the Systems Security Certified Practitioner (SSCP) risk, response, and recovery domain in addition to risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this course incorporates hands-on activities related to fundamentals of risk management, strategies, and approaches for mitigating risk. You will also learn how to create a plan that reduces risk. Additional Managing Risk in Information Systems Training course assets include case scenarios and handouts and eBook (via CourseSmart).

Customize It

● If you are familiar with some aspects of this Managing Risk in Information Systems Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group

• Information security analysts
• Payroll specialists
• IT infrastructure security specialists
• People who decide which information technology and cybersecurity products to acquire for their organization

Managing Risk in Information Systems Training Related Courses

Duration: 5 days

Objectives:

After completing this course, attendees will be able to:

• Basic concepts of and need for risk management
• Compliancy laws, standards, best practices, and policies of risk management
• Components of an effective organizational risk management program
• Techniques for identifying relevant threats, vulnerabilities, and exploits
• Risk mitigation security controls
• Concepts for implementing risk mitigation throughout an organization
• Perform a business impact analysis for a provided scenario
• Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization
• Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization
• Create a computer incident response team (CIRT) plan for an organization in a given scenario

Course Content:

1. Risk Management Business Challenges
• Risk Management Fundamentals
• Managing Risk: Threats, Vulnerabilities, and Exploits
• Maintaining Compliance
• Developing a Risk Management Plan

2. Mitigating Risk
• Defining Risk Assessment Approaches
• Performing a Risk Assessment
• Identifying Assets and Activities to Be Protected
• Identifying and Analyzing Threats, Vulnerabilities, and Exploits
• Identifying and Analyzing Risk Mitigation Security Controls
• Planning Risk Mitigation Throughout the Organization
• Turning Your Risk Assessment into a Risk Mitigation Plan

3. Risk Mitigation Plans
• Mitigating Risk with a Business Impact Analysis
• Mitigating Risk with a Business Continuity Plan
• Mitigating Risk with a Disaster Recovery Plan
• Mitigating Risk with a Computer Incident Response Team Plan

Labs

Lab 1: How to Identify Threats and Vulnerabilities in an IT Infrastructure
Lab 2: Align Threats and Vulnerabilities to the COBIT P09 Risk Management Controls
Lab 3: Define the Scope and Structure of an IT Risk Management Plan
Lab 4: Perform a Qualitative Risk Assessment for an IT Infrastructure
Lab 5: Identify Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap GUI (Nmap) and Nessus® Reports
Lab 6: Develop a Risk Mitigation Plan Outline for an IT Infrastructure
Lab 7: Perform a Business Impact Analysis for a Mock IT Infrastructure
Lab 8: Develop an Outline for a Business Continuity Plan for an IT Infrastructure
Lab 9: Develop Disaster Recovery Back-up Procedures and Recovery Instructions
Lab 10: Create a CIRT Response Plan for a Typical IT Infrastructure
 

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment