Security Risks: Performing Security Risk Identification

placeholder

Effective security risk management often begins with proper security risk identification. In this course youll examine various components of the risk identification process and different techniques used to identify risk. Youll begin by distinguishing between threat and risk. Youll then get familiar with other terminologies and concepts associated with risk identification. Moving on youll recognize the significance of risk identification in recognizing assets and services that are risk-prone. Youll also investigate different methods used to identify risk and best practices for the risk identification process. Later in the course youll outline common security-related risks and their impact on different components of an organization. Finally youll examine the features of a security risk register its role in risk management and how to create one in Microsoft Excel.