6 hours 30 minutes
now we talked about framing risks, right? Putting your risks in context, looking at all the variables that will impact your risk. But what about the other elements of the triangle here at the top? Assess.
Next we have respond, and then we have monitor, and we see again that all of those elements gonna feed into each other back and forth. Well, if we take a look at risk assessment when we conduct a risk assessment, what we're looking at doing is identifying, estimating and prioritising risk
as they relate to the organization as a whole or individual missions or assets or whatever.
And again, we have another risk, Um, framework 800-30 that covers risk assessment in its entirety. So I'm not gonna spend it on the time here, But what we're doing with risk assessment, we're determining a value for the risk. We're collecting information.
We are analyzing that information, and we want to find out
with the appropriate mitigation strategy is, and that's what risk assessments do is they drive your risk response
Are you a Linux systems administrator seeking to learn the best practices for securing your ...
12 CEU/CPE Hours Available
Certificate of Completion Offered
ISACA Certified in Risk and Information Systems Control (CRISC)
Demonstrate your expertise in identifying and managing IT risk within an enterprise and in implementing ...