CISM 2022: Assessing Risk

placeholder

Assessing risk is a crucial activity that enables organizations to evaluate risk exposure for business processes and assets.

In this course you will begin by exploring how to conduct vulnerability assessments and how the results can shed light on security control deficiencies. Next you will learn how to perform a network vulnerability assessment and review the results followed by scanning a web application for web app-specific vulnerabilities. You will discover how to conduct a gap analysis to determine the current security posture compared to a desired security posture. Then you will explore the important aspects of when and how to run penetration tests. Lastly you will see how to configure Microsoft Azure Policy assignments to determine cloud resource configuration compliance.

This course can be used to prepare for the Certified Information Security Manager (CISM) exam.