Skill Path

Risk Management

Skill Path

Risk Management is the proactive process of identifying, evaluating, and controlling threats that could prevent an organization from achieving its strategic goals or remaining compliant with laws. This skill path is designed to help you make sure the risks your organization does take are calculated and aligned with your governance strategy. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Path Releasing Q2 2025
Full access included with 
Insider Pro
 and 
Teams

4

H

41

M
Time

Intermediate

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Experience Level

10000

XP

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this Skill Path

Risk Management is the proactive process of identifying, evaluating, and controlling threats that could prevent an organization from achieving its strategic goals or remaining compliant with laws. This skill path is designed to help you make sure the risks your organization does take are calculated and aligned with your governance strategy. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

In this skill path, you will learn the basics of risk management,IT asset inventories & criticality mapping, business impact analysis, risk assessments, profiles, and mitigation, and vulnerability prioritization.

Completing this skill path and the associated Assessment will prepare learners with experience in cybersecurity who wish to make the transition to a leader, manager, or auditor of cybersecurity functions.

Read More

Skills you'll gain

Skill Path Outline

Coming Soon

The Incident Response Skill Path is expected to release in Q2 of 2025. Sign up now to explore our other Incident Response courses and content.

Start Learning for Free
1

Learn

Learn core concepts and get hands-on with key skills.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the basics of risk management. You will learn about roles and responsibilities, the risk management lifecycle, as well as how to measure and communicate risk.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the foundations of IT asset management. You will learn about building a complete asset inventory, criticality mapping and business value, asset ownership and accountability, as well as using inventories for risk decision making.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to the purpose of a business impact analysis. You will learn about identifying business processes and dependencies, impact assessment and prioritization, as well as how to maintain and update the business impact analysis.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to risk assessments. You will learn how to conduct a risk assessment, qualitative and quantitative techniques, as well as how to integrate risk assessments with GRC.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Risk Profile
1220
XP
H
29
M

In this course, you will be introduced to risk profiles. You will learn how to define a risk profile, build an organizational risk profile, use the risk profile for decision-making, as well as how to report risk posture.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE

In this course, you will be introduced to vulnerabilities. You will learn about scanning and discovery, prioritization models, how to operationalize vulnerability management, as well as vulnerability governance.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Risk Mitigation
1220
XP
H
29
M

In this course, you will be introduced to mitigation strategies. You will learn about designing effective controls, implementing mitigation plans, monitoring and validating controls, as well as reporting mitigation progress.

2

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE

In this challenge, you will review a case study about third-party access. You will consider the benefits of real-time monitoring improvements or governance-driven oversight reforms.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE

In this challenge, you will review a case study about monitoring and governance. You will consider the benefits of two approaches to reform after a breach.

3

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Risk Management
1500
XP
H
30
M

Test your knowledge of Risk Management to identify strengths, gaps, and weaknesses in areas like IT asset inventory & criticality mapping, business impact analysis, risk assessment and mitigation, and vulnerability prioritization. Measure your mastery of risk management and advance your career with targeted course recommendations.

4

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Instructors

Owen Dubiel
Security Engineer
Read Full Bio

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

Frequently Asked Questions

No items found.
This is some text inside of a div block.
Button Text