CRISC

Course
Time
5 hours 20 minutes
Difficulty
Advanced
CEU/CPE
7

Video Description

This lesson offers a brief introduction to the Risk and Control Monitoring Agenda. It is important to remember risks do not always disappear. Even if one risk has been solved, there could be another one. The risk monitoring agenda is comprised of: - Intrusion detection monitoring - Vulnerability assessments - Penetration testing

Video Transcription

00:04
now in our final chapter, Chapter five. Once again,
00:08
risks don't go away. Even if we think we've solved one risk, we may have created another work as the environment changes. This is one field. Certainly, that's one of the most dynamic fields you'll ever be involved in risk management relationship. The i T. So we're always watching were always monitoring,
00:26
were always planning. If you remember going that
00:28
plan, do check back
00:30
were always planning. Then we do. Then we're checking them. We have to act upon what we've learned. So this final chapter's gonna talk about some things that we do to monitor whether or not our mitigation strategies have been appropriate.
00:43
We'll talk about intrusion detection, monitoring. So using an I. D. S to monitor what's going on on, the network will talk a little bit about how those work in some different means that they use to detect whether or not on attack is present.
00:58
And then we'll talk about monitoring on our own, using vulnerability assessments and penetration tests so that we can test that we can see that our network is configured properly to rebuff the attacks from an attack.
01:12
So that's what's coming up in the chapters ahead

Up Next

CRISC

Archived Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor