Companies Home Search Profile

ISACA IT Risk Fundamentals: Complete Training Course

Focused View

Essential Credential

1:52:26

168 View
  • 1. Welcome.mp4
    01:38
  • 2. Common Risk Terms.mp4
    04:01
  • 3. Risk Related Business Functions.mp4
    04:46
  • 4. Three Lines of Defence.mp4
    02:27
  • 5. Policies, Standards and Procedures.mp4
    03:16
  • 1. Introduction to Risk Governance and Management.mp4
    00:36
  • 2. Risk Appetite, Risk Tolerance and Risk Capacity.mp4
    04:07
  • 3. Risk Governance.mp4
    03:36
  • 4. Risk Universe.mp4
    02:37
  • 5. Risk Appetite, Risk Tolerance and Risk Capacity.mp4
    04:07
  • 6. Risk Roles.mp4
    02:13
  • 1. Introduction to Risk Identification.mp4
    00:31
  • 2. Asset Types.mp4
    03:25
  • 3. Threats.mp4
    02:34
  • 4. Threat Intelligence.mp4
    03:04
  • 5. Vulnerabilities.mp4
    05:11
  • 6. Risk Scenarios.mp4
    04:27
  • 1. Introduction to Risk Assessment and Analysis.mp4
    00:27
  • 2. Risk Assessment Layers.mp4
    02:03
  • 3. Risk Analysis Approaches.mp4
    07:53
  • 4. Risk Analysis Techniques.mp4
    05:53
  • 5.1 Risk Register.xlsx
  • 5. Risk Register.mp4
    02:28
  • 6. Risk Owner.mp4
    01:57
  • 1. Introduction to Risk Response and Strategies.mp4
    00:31
  • 2. Risk Responses & Strategies.mp4
    04:57
  • 3. Controls Design & Implementation.mp4
    06:16
  • 4. Risk States.mp4
    02:00
  • 5. Business Case Developments.mp4
    04:17
  • 6. Risk Response Prioritisation.mp4
    01:53
  • 1. Introduction to Risk Monitoring, Reporting and Communication.mp4
    00:25
  • 2. Key Risk Indicators.mp4
    03:35
  • 3. Developing Risk Indicators.mp4
    05:52
  • 4.1 Penetration Test Report.pdf
  • 4.2 Vulnerability Scan Report.pdf
  • 4. Control Assessment and Testing.mp4
    05:32
  • 5. Reporting Principles.mp4
    02:53
  • 1. Summary.mp4
    00:58
  • Description


    Learn how to manage IT risk the ISACA way with this course based on The ISACA IT Risk Fundamentals Certificate

    What You'll Learn?


    • Prepare for and pass the ISACA IT Risk Fundamentals exam first time
    • Gain a clear understanding of all the ISACA IT Risk Fundamentals Domains
    • Understand IT Security and Cyber Security from a management-level perspective
    • Learn what the IT Risk Fundamentals certificate can do for your career

    Who is this for?


  • Anyone wanting to get a deeper understanding of cyber security and IT risk management
  • Students preparing for the ISACA IT Risk Fundamentals exam
  • What You Need to Know?


  • No prior knowledge required! This course will teach you everything need to know about Cybersecurity & IT Risk Management
  • More details


    Description

    Every organisation experiences risk. ISACA’s IT Risk Fundamentals Certificate is perfect for anyone wanting to learn about information and technology (I&T)-related risk. Our IT Risk Fundamentals course covers the fundamentals of risk management; from identifying and prioritising risk to responding and communicating the risk to management. You’ll learn about six functions throughout the course:


    Domain 1 - Risk Introduction and Overview (5%): We start by setting a strong foundation and understanding of risk. In this domain we will cover fundamental concepts of IT risk management. We will discuss how risks links to business functions, the importance of the three lines of defense and the role of IT controls.


    Domain 2 - Risk Governance and Management (15%): We will explain the structure of risk governance and management and how it's used to set a direction for a business. We will discuss risk appetite, risk tolerance, and risk capacity and introduce the risk management cycle.


    Domain 3 - Risk Identification (20%): Risk identification is the process of spotting and documenting the risks a business faces. It is crucial because only identified risks can be assessed and responded to. In this domain we will talk about assets, threats, and vulnerabilities and how we can use them to identify risk.


    Domain 4 - Risk Assessment and Analysis (25%): After identifying risk, the next step is to understand its impact on the business. In this domain, we will discuss the different approaches to risk assessments, how to use risk registers to document risks, and the importance of risk aggregation.


    Domain 5 - Risk Response (15%): After risk has been identified and assessed, decisions need to be made about the appropriate risk response. In this domain we will discuss risk response strategies, control design and implementation and other response approaches.


    Domain 6 - Risk Monitoring, Reporting and Communication (20%): The monitoring and reporting of risk play an important role in the risk management process. Indicators for risk and performance should be considered carefully and chosen deliberately, based on their alignment with enterprise goals. Because of the changing nature of risk and associated controls, ongoing monitoring and reporting are essential steps in the risk management process.

    Who this course is for:

    • Anyone wanting to get a deeper understanding of cyber security and IT risk management
    • Students preparing for the ISACA IT Risk Fundamentals exam

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Essential Credential
    Essential Credential
    Instructor's Courses
    Welcome to Essential Credential!At Essential Credential, we believe in your ability to sculpt your future and achieve greatness. About usEssential Credential is your go-to destination for personalized and comprehensive online learning. Whether you're a student striving for academic excellence, a professional eager to upskill, or an aspiring candidate preparing for exams, Essential Credential is your trusted partner on the path to success.Our InstructorsMeet our fantastic trio of instructors: William King, a seasoned IT expert with over a decade of experience; Darren Rapael, a cybersecurity specialist with 9+ years of hands-on expertise; and Matt Foster, our expert in Risk & Compliance, bringing over 5 years of dedicated experience. Each of them brings a unique set of skills and is passionate about sharing their knowledge, making them your friendly guides through the worlds of IT, cybersecurity, and risk management
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 35
    • duration 1:52:26
    • Release Date 2024/07/25