It Risk Management
Tags: Risk Management
An introductory course about understanding IT Risk Management and the different components that make up ECM solutions.
Last updated 2022-01-10 | 3.9
- Have an overview of both IT Risk and Risk Management.- Be introduced to IT Risk Management.
- Be aware of the four components of Risk Management Methodology.
What you'll learn
* Requirements
* Basic understanding of the IT industry* Knowledge of the English language
Description
IT risk management is the application of risk management to Information technology context in order to manage IT risk such as the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.
Varying definitions of risk management will be explained in this course as well as the different methodologies that exist to manage IT risks. Each of them is broken down into processes and steps. This course will also give an overview of IT risk and risk management as an introduction to the lessons.
Who this course is for:
- Businesses wanting to reduce and manage IT risks, to IT managers wanting to learn about risk management processes, and to IT professionals investigating IT risk methodologies.
- IT practitioners who need to develop their skills that are crucial, as businesses embark on this massive transformation.
Course content
9 sections • 78 lectures
Introduction and Objectives Preview 00:26
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 2: Introduction to IT Risk
Lecture 3: Definitions of IT Risk
Lecture 4: Four "A"s
Lecture 5: IT Risk Disciplines
Lecture 6: Cause of IT Risk
Lecture 7: Ineffective and Inadequate IT Governance
Lecture 8: Effective IT Governance
Introduction to IT Risk Preview 02:24
This lecture will provide an overview of IT Risk.
.
Lecture outline:
0:00 Introduction to IT Risk
1:09 What is IT Risk?
Definitions of IT Risk Preview 03:21
This lecture will talk about the different definitions of IT Risk.
.
Lecture outline:
0:00 ISO/IEC
0:21 NIST
1:14 FAIR
1:25 The Committee on National Security Systems
2:20 Risk defined by The National Information Assurance Training and Education Center
Four "A"s Preview 00:35
This lecture will explain the four "As" of IT Risk.
IT Risk Disciplines Preview 00:43
This lecture will discuss the disciplines of IT Risk.
Cause of IT Risk Preview 00:53
This lecture will cover the cause of IT Risk.
Ineffective and Inadequate IT Governance Preview 02:21
This lecture will identify the ineffectiveness and inadequacy of IT Governance.
.
Lecture outline:
0:00 Definition of IT Governance
0:52 Inadequate IT Governance
Effective IT Governance Preview 03:57
This discussion will focus on the effectiveness of IT Governance.
.
Lecture outline:
0:00 Introduction to Effective IT Goverenance
0:16 Uncontrolled Complexity
1:08 Inattention to Risk
2:46 Conclusion
Introduction and Objectives Preview 00:25
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 11: Risk Management
Lecture 12: Risk Management Procedures
Lecture 13: Risk Management Methods
Lecture 14: Risk Management Principles
Lecture 15: Risk Management Process
Lecture 16: Importance of Risk Management
Lecture 17: Information Security
Lecture 18: System Development Lifecycle
Risk Management Preview 04:08
This lecture will talk about Risk Management.
.
Lecture outline:
0:00 Definition of Risk Management
1:31 Other Definitions of Risk Management
3:34 Probability and Consequence
Risk Management Procedures Preview 01:30
This lecture will identify the different procedures of Risk Management.
Risk Management Methods Preview 00:43
This discussion will focus on the methods of Risk Management.
Risk Management Principles Preview 01:01
This lecture will identify the different principles of Risk Management.
Risk Management Process Preview 03:49
This lecture will discuss the process of Risk Management.
.
Lecture outline:
0:00 Introduction to the Risk Management Process
0:14 Identify the Risks
0:47 Identify the Causes
1:20 Identify the Controls
2:01 Establish your Likelihood and Consequence Descriptors
2:38 Establish your Risk Rating Descriptors
2:56 Add Other Controls
3:13 Make a Decision
3:36 Monitor and Review
Importance of Risk Management Preview 01:50
This lecture will talk about the importance of Risk Management.
Information Security Preview 03:03
This lecture will explain information security.
System Development Lifecycle Preview 02:27
This discussion will center on the lifecycle of system development.
Introduction and Objectives Preview 00:35
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 21: Risk Management
Lecture 22: IT Risk Management Issues
Lecture 23: Failure of Risk Management in IT
Lecture 24: Effective IT Risk Management
Lecture 25: Step One: Identify
Lecture 26: Step Two: Access
Lecture 27: Step Three: Remediate IT Risks
Lecture 28: Step Four: Manage
Lecture 29: Conclusion
Risk Management Preview 05:28
This discussion will focus on the overview of Risk Management.
IT Risk Management Issues Preview 08:04
This lecture will explain some issues involving IT Risk management.
.
Lecture outline:
0:00 Introduction to Overlooked IT Risk Management Issues
0:33 Key Personnel Losses in User Areas
1:08 Merger and Acquisition Fallout
2:04 Poor Communications
2:51 Carelessness with Vendors
3:34 Board Engagement in Decision-Making
4:15 Distributed Servers in Remote Locations
4:57 Expert Knowledge Hoarding
5:58 Employee Dating and Spouses
6:38 Lack of Documentation
7:19 Your Disaster Recovery Plan
Failure of Risk Management in IT Preview 07:55
This lecture will talk about why Risk Management fails in IT.
.
Lecture outline:
0:00 Introduction to Why Risk Management Fails in IT
1:28 Expensive and Impossible to Identify
2:29 Impossible to Assign Value
4:09 Wrong Predictions of Actual Disasters
6:15 Devolves to "protect everything"
Effective IT Risk Management Preview 02:19
This lecture will discuss effective IT Risk management and the steps you can take to ensure its effectivity.
Step One: Identify Preview 03:02
This discussion will focus on step one of effective IT Risk management, namely identify.
.
Lecture outline:
0:00 Introduction to Identify
0:33 Data Confidentiality
1:01 Data Integrity Risk
1:47 Relevance Risk
2:07 Project Risk
2:26 What's Next?
Step Two: Access Preview 01:23
This discussion will focus on step two of effective IT Risk management, namely access.
Step Three: Remediate IT Risks Preview 01:40
This discussion will focus on step three of effective IT Risk management, namely remediate IT Risks.
Step Four: Manage Preview 02:39
This discussion will focus on step four of effective IT Risk management, namely manage.
Conclusion Preview 01:01
This lecture will give a conclusion on the effectiveness of IT Risk management.
Introduction and Objectives Preview 00:28
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 32: Types of Content Management System
Lecture 33: Risk Management Process
Lecture 34: Process: Frame
Lecture 35: Input and Preconditions
Lecture 36: Feedback and Risk Assumptions
Lecture 37: Consequences and Impact
Lecture 38: Likelihood and Risk Constraints
Lecture 39: Risk Tolerance and Priorities / Tradeoffs
Lecture 40: Output and Post Conditions
Risk Management Process Preview 01:40
This lecture will provide an overview of the process of Risk Management.
.
Lecture outline:
0:00 Methodology Defined
0:27 Risk Assessment Defined
0:58 Introduction to the Risk Management Process
Process: Frame Preview 02:32
This lecture will discuss the first process of Risk Management, namely frame.
Input and Preconditions Preview 01:15
This discussion will focus on the input and preconditions of the framing process.
Feedback and Risk Assumptions Preview 04:27
This lecture will talk about the feedback and risk assumptions involved in the framing process.
Threat Sources and Vulnerabilities Preview 05:56
This discussion will address the threats and vulnerabilities involved in the framing process.
Consequences and Impact Preview 02:40
This discussion will center on the consequences and impact involved in the framing process.
Likelihood and Risk Constraints Preview 04:40
This lecture will talk about likelihood and risk constraints involved in the framing process.
.
Lecture outline:
0:00 Likelihood
2:12 Risk Constraints
Risk Tolerance and Priorities / Tradeoffs Preview 02:46
This lecture will explain the risk tolerance and priorities involved in the framing process.
.
Lecture outline:
0:00 Risk Tolerance
1:29 Priorities and Tradeoffs
Output and Post Conditions Preview 01:40
This lecture will discuss the output and post conditions involved in the framing process.
Introduction and Objectives Preview 00:29
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 43: Risk Management Process
Lecture 44: Process: Assets
Lecture 45: Input and Preconditions
Lecture 46: Risk Determination and Uncertainty
Lecture 47: Threat and Vulnerability Identification
Lecture 48: Output and Post Conditions
Lecture 49: Process: Respond
Lecture 50: Input and Preconditions
Lecture 51: Risk Acceptance, Avoidance and Mitigation
Lecture 52: Risk Share or Transfer
Lecture 53: Evaluations and Alternatives
Lecture 54: Risk Response Decision and Implementation
Risk Management Process Preview 00:14
This lecture will provide an overview of the process of Risk Management.
Process: Assets Preview 04:30
This lecture will discuss the second process of Risk Management, namely assets.
Input and Preconditions Preview 02:31
This lecture will explain the input and preconditions involved in the assets process.
Risk Determination and Uncertainty Preview 03:58
This lecture will discuss risk determination and uncertainty involved in the assets process.
Threat and Vulnerability Identification Preview 05:22
This discussion will focus on the threat and vulnerability involved in the assets process.
Output and Post Conditions Preview 03:27
This discussion will center on the output and post conditions involved in the assets process.
Process: Respond Preview 01:54
This lecture will discuss the third process of Risk Management, namely respond.
Input and Preconditions Preview 02:22
This lecture will talk about the input and preconditions involved in the respond process.
Risk Acceptance, Avoidance and Mitigation Preview 05:48
This lecture will explain the risk acceptance, avoidance, and mitigation involved in the respond process.
.
Lecture outline:
0:00 Risk Response Identification
1:25 Risk Acceptance
3:15 Risk Avoidance
4:23 Risk Mitigation
Risk Share or Transfer Preview 01:55
This lecture will discuss risk shares involved in the respond process.
Evaluations and Alternatives Preview 04:43
This discussion will focus on the evaluations and alternatives involved in the respond process.
Risk Response Decision and Implementation Preview 04:18
This discussion will center on the risk response decision and implementation involved in the respond process.
.
Lecture outline:
0:00 Risk Response Decision
1:17 Risk Response Implementation
2:10 Output and Post Conditions
Introduction and Objectives Preview 00:26
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 57: Risk Management Process
Lecture 58: Process: Monitor
Lecture 59: Input and Preconditions
Lecture 60: Risk Monitoring Strategy
Lecture 61: Monitoring Compliance, Effectiveness and Changes
Lecture 62: Automated vs Manual Monitoring
Lecture 63: Monitoring Frequency
Lecture 64: Risk Monitoring
Lecture 65: Output and Post Conditions
Risk Management Process Preview 00:10
This lecture will provide an overview of the process of Risk Management.
Process: Monitor Preview 02:16
This lecture will discuss the fourth process of Risk Management, namely monitor.
Input and Preconditions Preview 01:15
This lecture will explain input and preconditions involved in the monitor process.
Risk Monitoring Strategy Preview 01:52
This discussion will focus on the risk monitoring strategy involved in the monitor process.
Monitoring Compliance, Effectiveness and Changes Preview 07:33
This lecture will discuss monitoring compliance, effectiveness, and changes involved in the monitor process.
.
Lecture outline:
0:00 Monitoring Compliance
2:16 Monitoring Effectiveness
5:04 Monitoring Changes
Automated vs Manual Monitoring Preview 02:06
This lecture will explain the difference between automated and manual monitoring in the monitor process.
Monitoring Frequency Preview 01:52
This lecture will discuss the monitoring frequency involved in the monitor process.
Risk Monitoring Preview 01:37
This discussion will focus on keeping track of risk involved in the monitor process.
Output and Post Conditions Preview 01:31
This lecture will talk about the output and post conditions involved in the monitor process.
Introduction and Objectives Preview 00:26
In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.
Section Outline
Lecture 68: Risk IT
Lecture 69: Risk IT Principles
Lecture 70: Connect to Business Objectives
Lecture 71: Align IT Risk Management with ERM
Lecture 72: Balance Cost / Benefit of IT Risk
Lecture 73: Promote Fair and Open Communication
Lecture 74: Establish Tone at the Top and Accountability
Lecture 75: Function as Part of Daily Activities
Lecture 76: What Does Risk IT do?
Lecture 77: Benefits of Risk IT
Lecture 78: Risk IT Framework
Lecture 79: Framework: Risk Governance
Lecture 80: Framework: Risk Evaluation
Lecture 81: Framework: Risk Response
Risk IT Preview 01:32
This lecture will explain and define Risk IT.
Risk IT Principles Preview 00:57
This lecture will identify the different principles of Risk IT.
Connect to Business Objectives Preview 01:01
This discussion will focus on the business objectives involved in Risk IT.
Align IT Risk Management with ERM Preview 00:50
This lecture will discuss the alignment of IT Risk management with ERM.
Balance Cost / Benefit of IT Risk Preview 00:30
This lecture will identify the benefits of IT risk.
Promote Fair and Open Communication Preview 00:32
This lecture will talk about promoting fair and open communication involved in Risk IT.
Establish Tone at the Top and Accountability Preview 01:17
This lecture will explain establishing tone and accountability in Risk IT.
Function as Part of Daily Activities Preview 01:30
This lecture will discuss the function of Risk IT as part of daily activities.
What Does Risk IT do? Preview 00:45
This discussion will focus on what Risk IT does.
Benefits of Risk IT Preview 00:56
This lecture will identify the different benefits of Risk IT.
Risk IT Framework Preview 01:09
This discussion will focus on the frameworks involved in Risk IT.
Framework: Risk Governance Preview 07:54
This lecture will discuss one of the frameworks of Risk IT, specifically risk governance.
.
Lecture outline:
0:00 Introduction to the Risk Governance Process
0:18 Risk Governance Essentials
0:44 Risk Appetite
1:39 Guidance that applies to both Risk Appetite and Risk Tolerance
4:21 Responsibility and Accountability
4:55 Awareness and Communication
6:46 Risk Culture
Framework: Risk Evaluation Preview 02:07
This lecture will discuss one of the frameworks of Risk IT, specifically risk evaluation.
.
Lecture outline:
0:00 Introduction to the Risk Evaluation Process
0:14 Risk Evaluation Essentials
0:32 Describing Business Impact
1:26 IT Risk Scenarios
Framework: Risk Response Preview 08:52
This lecture will discuss one of the frameworks of Risk IT, specifically risk response.
.
Lecture outline:
0:00 Introduction to the Risk Response Process
0:09 Risk Response Essentials
0:30 Key Risk Indicators (KRI)
2:35 Benefits of Key Risk Indicators
3:23 Problems when facing KRIs
4:30 Risk Response Definition
4:47 Risk Avoidance
5:36 Risk Reduction / Mitigation
6:13 Risk Sharing / Transfer
4:47 Risk Acceptance
5:36 Risk Reduction / Mitigation
5:54 Risk Acceptance
IT Risk Management Glossary of Terms Preview 2 pages
This e book is a list of terms and definitions often used in the field of IT Risk Management.
Final Exam Preview 1 page
Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.
Certification is not mandatory.
Once you've completed the course, email our exam department at [email protected] to purchase your exam voucher and sit your final exam.
. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.
You will receive a PDF certificate through your email upon passing the examination.
Evaluation Form Preview 1 page
We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.
Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.