Risk Assessments
In this course, you will be introduced to risk assessments. You will learn how to conduct a risk assessment, qualitative and quantitative techniques, as well as how to integrate risk assessments with GRC.

Course Content
Upon completing this course, you should be able to:
- Define the purpose of cybersecurity risk assessments and explain how they support prioritization, investment decisions, and executive accountability
- Apply common risk assessment frameworks and approaches (NIST, ISO, FAIR) to structure assessments consistently and defensibly
- Identify and evaluate threats, vulnerabilities, and exposure conditions using appropriate scoping, evidence collection, and documentation practices
- Differentiate qualitative and quantitative assessment techniques and select the right model based on maturity, decision needs, and data availability
- Conduct effective risk assessments by integrating threat modeling, compensating controls, peer review, and stakeholder communication
- Integrate assessment results into GRC workflows by updating risk registers, mapping findings to controls, and supporting board-level reporting
- Evaluate modern trends in risk assessments including continuous assessment models, AI-supported scoring, and convergence of GRC, IR, and SOC data














