It Risk Management

An introductory course about understanding IT Risk Management and the different components that make up ECM solutions.

Last updated 2022-01-10 | 3.9

- Have an overview of both IT Risk and Risk Management.
- Be introduced to IT Risk Management.
- Be aware of the four components of Risk Management Methodology.

What you'll learn

Have an overview of both IT Risk and Risk Management.
Be introduced to IT Risk Management.
Be aware of the four components of Risk Management Methodology.
To understand Risk IT.

* Requirements

* Basic understanding of the IT industry
* Knowledge of the English language

Description

IT risk management is the application of risk management to Information technology context in order to manage IT risk such as the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.

Varying definitions of risk management will be explained in this course as well as the different methodologies that exist to manage IT risks. Each of them is broken down into processes and steps. This course will also give an overview of IT risk and risk management as an introduction to the lessons.

Who this course is for:

  • Businesses wanting to reduce and manage IT risks, to IT managers wanting to learn about risk management processes, and to IT professionals investigating IT risk methodologies.
  • IT practitioners who need to develop their skills that are crucial, as businesses embark on this massive transformation.

Course content

9 sections • 78 lectures

Introduction and Objectives Preview 00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 2: Introduction to IT Risk

Lecture 3: Definitions of IT Risk

Lecture 4: Four "A"s

Lecture 5: IT Risk Disciplines

Lecture 6: Cause of IT Risk

Lecture 7: Ineffective and Inadequate IT Governance

Lecture 8: Effective IT Governance

Introduction to IT Risk Preview 02:24

This lecture will provide an overview of IT Risk.

.

Lecture outline:

0:00    Introduction to IT Risk
1:09    What is IT Risk?

Definitions of IT Risk Preview 03:21

This lecture will talk about the different definitions of IT Risk.

.

Lecture outline:

0:00    ISO/IEC
0:21    NIST
1:14    FAIR
1:25    The Committee on National
        Security Systems
2:20    Risk defined by The National
        Information Assurance Training
        and Education Center

Four "A"s Preview 00:35

This lecture will explain the four "As" of IT Risk.

IT Risk Disciplines Preview 00:43

This lecture will discuss the disciplines of IT Risk.

Cause of IT Risk Preview 00:53

This lecture will cover the cause of IT Risk.

Ineffective and Inadequate IT Governance Preview 02:21

This lecture will identify the ineffectiveness and inadequacy of IT Governance.

.

Lecture outline:

0:00    Definition of IT Governance
0:52    Inadequate IT Governance

Effective IT Governance Preview 03:57

This discussion will focus on the effectiveness of IT Governance.

.

Lecture outline:

0:00    Introduction to Effective IT Goverenance
0:16    Uncontrolled Complexity
1:08    Inattention to Risk
2:46    Conclusion

Introduction and Objectives Preview 00:25

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 11: Risk Management

Lecture 12: Risk Management Procedures

Lecture 13: Risk Management Methods

Lecture 14: Risk Management Principles

Lecture 15: Risk Management Process

Lecture 16: Importance of Risk Management

Lecture 17: Information Security

Lecture 18: System Development Lifecycle

Risk Management Preview 04:08

This lecture will talk about Risk Management.

.

Lecture outline:

0:00    Definition of Risk Management
1:31    Other Definitions of Risk Management
3:34    Probability and Consequence

Risk Management Procedures Preview 01:30

This lecture will identify the different procedures of Risk Management.

Risk Management Methods Preview 00:43

This discussion will focus on the methods of Risk Management.

Risk Management Principles Preview 01:01

This lecture will identify the different principles of Risk Management.

Risk Management Process Preview 03:49

This lecture will discuss the process of Risk Management.

.

Lecture outline:

0:00    Introduction to the Risk Management Process
0:14    Identify the Risks
0:47    Identify the Causes
1:20    Identify the Controls
2:01    Establish your Likelihood and Consequence Descriptors
2:38    Establish your Risk Rating Descriptors
2:56    Add Other Controls
3:13    Make a Decision
3:36    Monitor and Review

Importance of Risk Management Preview 01:50

This lecture will talk about the importance of Risk Management.

Information Security Preview 03:03

This lecture will explain information security.

System Development Lifecycle Preview 02:27

This discussion will center on the lifecycle of system development.

Introduction and Objectives Preview 00:35

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 21: Risk Management

Lecture 22: IT Risk Management Issues

Lecture 23: Failure of Risk Management in IT

Lecture 24: Effective IT Risk Management

Lecture 25: Step One: Identify

Lecture 26: Step Two: Access

Lecture 27: Step Three: Remediate IT Risks

Lecture 28: Step Four: Manage

Lecture 29: Conclusion

Risk Management Preview 05:28

This discussion will focus on the overview of Risk Management.

IT Risk Management Issues Preview 08:04

This lecture will explain some issues involving IT Risk management.

.

Lecture outline:

0:00    Introduction to Overlooked IT Risk Management Issues
0:33    Key Personnel Losses in User Areas
1:08    Merger and Acquisition Fallout
2:04    Poor Communications
2:51    Carelessness with Vendors
3:34    Board Engagement in Decision-Making
4:15    Distributed Servers in Remote Locations
4:57    Expert Knowledge Hoarding
5:58    Employee Dating and Spouses
6:38    Lack of Documentation
7:19    Your Disaster Recovery Plan

Failure of Risk Management in IT Preview 07:55

This lecture will talk about why Risk Management fails in IT.

.

Lecture outline:

0:00    Introduction to Why Risk Management Fails in IT
1:28    Expensive and Impossible to Identify
2:29    Impossible to Assign Value
4:09    Wrong Predictions of Actual Disasters
6:15    Devolves to "protect everything"

Effective IT Risk Management Preview 02:19

This lecture will discuss effective IT Risk management and the steps you can take to ensure its effectivity.

Step One: Identify Preview 03:02

This discussion will focus on step one of effective IT Risk management, namely identify.

.

Lecture outline:

0:00    Introduction to Identify
0:33    Data Confidentiality
1:01    Data Integrity Risk
1:47    Relevance Risk
2:07    Project Risk
2:26    What's Next?

Step Two: Access Preview 01:23

This discussion will focus on step two of effective IT Risk management, namely access.

Step Three: Remediate IT Risks Preview 01:40

This discussion will focus on step three of effective IT Risk management, namely remediate IT Risks.

Step Four: Manage Preview 02:39

This discussion will focus on step four of effective IT Risk management, namely manage.

Conclusion Preview 01:01

This lecture will give a conclusion on the effectiveness of IT Risk management.

Introduction and Objectives Preview 00:28

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 32: Types of Content Management System

Lecture 33: Risk Management Process

Lecture 34: Process: Frame

Lecture 35: Input and Preconditions

Lecture 36: Feedback and Risk Assumptions

Lecture 37: Consequences and Impact

Lecture 38: Likelihood and Risk Constraints

Lecture 39: Risk Tolerance and Priorities / Tradeoffs

Lecture 40: Output and Post Conditions

Risk Management Process Preview 01:40

This lecture will provide an overview of the process of Risk Management.

.

Lecture outline:

0:00    Methodology Defined
0:27    Risk Assessment Defined
0:58    Introduction to the Risk Management Process

Process: Frame Preview 02:32

This lecture will discuss the first process of Risk Management, namely frame.

Input and Preconditions Preview 01:15

This discussion will focus on the input and preconditions of the framing process.

Feedback and Risk Assumptions Preview 04:27

This lecture will talk about the feedback and risk assumptions involved in the framing process.

Threat Sources and Vulnerabilities Preview 05:56

This discussion will address the threats and vulnerabilities involved in the framing process.

Consequences and Impact Preview 02:40

This discussion will center on the consequences and impact involved in the framing process.

Likelihood and Risk Constraints Preview 04:40

This lecture will talk about likelihood and risk constraints involved in the framing process.

.

Lecture outline:

0:00    Likelihood
2:12    Risk Constraints

Risk Tolerance and Priorities / Tradeoffs Preview 02:46

This lecture will explain the risk tolerance and priorities involved in the framing process.

.

Lecture outline:

0:00    Risk Tolerance
1:29    Priorities and Tradeoffs

Output and Post Conditions Preview 01:40

This lecture will discuss the output and post conditions involved in the framing process.

Introduction and Objectives Preview 00:29

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 43: Risk Management Process

Lecture 44: Process: Assets

Lecture 45: Input and Preconditions

Lecture 46: Risk Determination and Uncertainty

Lecture 47: Threat and Vulnerability Identification

Lecture 48: Output and Post Conditions

Lecture 49: Process: Respond

Lecture 50: Input and Preconditions

Lecture 51: Risk Acceptance, Avoidance and Mitigation

Lecture 52: Risk Share or Transfer

Lecture 53: Evaluations and Alternatives

Lecture 54: Risk Response Decision and Implementation

Risk Management Process Preview 00:14

This lecture will provide an overview of the process of Risk Management.

Process: Assets Preview 04:30

This lecture will discuss the second process of Risk Management, namely assets.

Input and Preconditions Preview 02:31

This lecture will explain the input and preconditions involved in the assets process.

Risk Determination and Uncertainty Preview 03:58

This lecture will discuss risk determination and uncertainty involved in the assets process.

Threat and Vulnerability Identification Preview 05:22

This discussion will focus on the threat and vulnerability involved in the assets process.

Output and Post Conditions Preview 03:27

This discussion will center on the output and post conditions involved in the assets process.

Process: Respond Preview 01:54

This lecture will discuss the third process of Risk Management, namely respond.

Input and Preconditions Preview 02:22

This lecture will talk about the input and preconditions involved in the respond process.

Risk Acceptance, Avoidance and Mitigation Preview 05:48

This lecture will explain the risk acceptance, avoidance, and mitigation involved in the respond process.

.

Lecture outline:

0:00    Risk Response Identification
1:25    Risk Acceptance
3:15    Risk Avoidance
4:23    Risk Mitigation

Risk Share or Transfer Preview 01:55

This lecture will discuss risk shares involved in the respond process.

Evaluations and Alternatives Preview 04:43

This discussion will focus on the evaluations and alternatives involved in the respond process.

Risk Response Decision and Implementation Preview 04:18

This discussion will center on the risk response decision and implementation involved in the respond process.

.

Lecture outline:

0:00    Risk Response Decision
1:17    Risk Response Implementation
2:10    Output and Post Conditions

Introduction and Objectives Preview 00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 57: Risk Management Process

Lecture 58: Process: Monitor

Lecture 59: Input and Preconditions

Lecture 60: Risk Monitoring Strategy

Lecture 61: Monitoring Compliance, Effectiveness and Changes

Lecture 62: Automated vs Manual Monitoring

Lecture 63: Monitoring Frequency

Lecture 64: Risk Monitoring

Lecture 65: Output and Post Conditions

Risk Management Process Preview 00:10

This lecture will provide an overview of the process of Risk Management.

Process: Monitor Preview 02:16

This lecture will discuss the fourth process of Risk Management, namely monitor.

Input and Preconditions Preview 01:15

This lecture will explain input and preconditions involved in the monitor process.

Risk Monitoring Strategy Preview 01:52

This discussion will focus on the risk monitoring strategy involved in the monitor process.

Monitoring Compliance, Effectiveness and Changes Preview 07:33

This lecture will discuss monitoring compliance, effectiveness, and changes involved in the monitor process.

.

Lecture outline:

0:00    Monitoring Compliance
2:16    Monitoring Effectiveness
5:04    Monitoring Changes

Automated vs Manual Monitoring Preview 02:06

This lecture will explain the difference between automated and manual monitoring in the monitor process.

Monitoring Frequency Preview 01:52

This lecture will discuss the monitoring frequency involved in the monitor process.

Risk Monitoring Preview 01:37

This discussion will focus on keeping track of risk involved in the monitor process.

Output and Post Conditions Preview 01:31

This lecture will talk about the output and post conditions involved in the monitor process.

Introduction and Objectives Preview 00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 68: Risk IT

Lecture 69: Risk IT Principles

Lecture 70: Connect to Business Objectives

Lecture 71: Align IT Risk Management with ERM

Lecture 72: Balance Cost / Benefit of IT Risk

Lecture 73: Promote Fair and Open Communication

Lecture 74: Establish Tone at the Top and Accountability

Lecture 75: Function as Part of Daily Activities

Lecture 76: What Does Risk IT do?

Lecture 77: Benefits of Risk IT

Lecture 78: Risk IT Framework

Lecture 79: Framework: Risk Governance

Lecture 80: Framework: Risk Evaluation

Lecture 81: Framework: Risk Response

Risk IT Preview 01:32

This lecture will explain and define Risk IT.

Risk IT Principles Preview 00:57

This lecture will identify the different principles of Risk IT.

Connect to Business Objectives Preview 01:01

This discussion will focus on the business objectives involved in Risk IT.

Align IT Risk Management with ERM Preview 00:50

This lecture will discuss the alignment of IT Risk management with ERM.

Balance Cost / Benefit of IT Risk Preview 00:30

This lecture will identify the benefits of IT risk.

Promote Fair and Open Communication Preview 00:32

This lecture will talk about promoting fair and open communication involved in Risk IT.

Establish Tone at the Top and Accountability Preview 01:17

This lecture will explain establishing tone and accountability in Risk IT.

Function as Part of Daily Activities Preview 01:30

This lecture will discuss the function of Risk IT as part of daily activities.

What Does Risk IT do? Preview 00:45

This discussion will focus on what Risk IT does.

Benefits of Risk IT Preview 00:56

This lecture will identify the different benefits of Risk IT.

Risk IT Framework Preview 01:09

This discussion will focus on the frameworks involved in Risk IT.

Framework: Risk Governance Preview 07:54

This lecture will discuss one of the frameworks of Risk IT, specifically risk governance.

.

Lecture outline:

0:00    Introduction to the Risk Governance Process
0:18    Risk Governance Essentials
0:44    Risk Appetite
1:39    Guidance that applies to both Risk Appetite and Risk Tolerance
4:21    Responsibility and Accountability
4:55    Awareness and Communication
6:46    Risk Culture

Framework: Risk Evaluation Preview 02:07

This lecture will discuss one of the frameworks of Risk IT, specifically risk evaluation.

.

Lecture outline:

0:00    Introduction to the Risk Evaluation Process
0:14    Risk Evaluation Essentials
0:32    Describing Business Impact
1:26    IT Risk Scenarios

Framework: Risk Response Preview 08:52

This lecture will discuss one of the frameworks of Risk IT, specifically risk response.

.

Lecture outline:

0:00    Introduction to the Risk Response Process
0:09    Risk Response Essentials
0:30    Key Risk Indicators (KRI)
2:35    Benefits of Key Risk Indicators
3:23    Problems when facing KRIs
4:30    Risk Response Definition
4:47    Risk Avoidance
5:36    Risk Reduction / Mitigation
6:13    Risk Sharing / Transfer
4:47    Risk Acceptance
5:36    Risk Reduction / Mitigation
5:54    Risk Acceptance

IT Risk Management Glossary of Terms Preview 2 pages

This e book is a list of terms and definitions often used in the field of IT Risk Management.

Final Exam Preview 1 page

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at [email protected] to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

Evaluation Form Preview 1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.