Evaluating and Planning for Security Risks

Is This for You?

This course is designed as an introductory-level information security course for anyone looking to develop an understanding of essential information security concepts.

Award and Associated Qualifications

cpd

Awarded 12 CPD points upon successful completion

About This Course

Familiarity with the essential concepts associated with IT infrastructure and information security risk enables IT professionals to identify, evaluate, and prioritise security risks. In this course, you’ll get to know the terminologies, activities, and concepts associated with the security risk management process.

As you might expect, effective security risk management often begins with proper security risk identification. In the course, you’ll examine various components of the risk identification process and different techniques used to identify risk. You’ll explore the assessment, classification, and prioritisation of security risks. And you’ll identify the activities involved in the risk management process, the importance of risk strategies in the context of work environments, and essential decisions required for managing security risks effectively.

COURSE CONTENT

Module 1 – Key Risk Terms & Concepts

Module 2 – Performing Security Risk Identification

Module 3 – Performing Security Risk Assessments

Module 4 – Planning for Security Risk Management

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.

Aims and Objectives

This course is designed to further and deepen your introduction to core information security concepts.

Pre-Requisites

There are no pre-requisites for this course.

Finance Options

Wherever possible our training is tailored to your needs. The cost of our training programmes depend on the course(s) you choose and varies according to duration and breadth. Rest assured we have a number of payment options available to ensure the cost of training is affordable and can be worked alongside your other financial commitments. Common ways people fund their training include: –

Self-Funded:

  • Flexible payment plans to help you spread the cost* available at many of our centres;
  • You could opt to pay upfront.

Company Funded:

Requesting funding from your employers needn’t be a daunting task. Many employers support and encourage their employees with their professional development and consider it a worthwhile investment to fund any training required.

What we can help with:

  • Providing a comprehensive training programme outlining learning outcomes
  • Tailored personnel letters
  • Communication with finance departments to arrange payment options (upfront or payment plan*).

Funding & Grants:

There may be the opportunity to apply for funded grants that can help towards the cost of training. These include the Skills Development Scotland ITAs and the ReAct programme in Wales. All schemes will have different terms and conditions that will need to be met in order to qualify for a grant and these are managed by each individual centre.

We’d recommend you speak to a Course Advisor in your local centre to find out whether they are registered to offer any such schemes and discuss your requirements further.

* Terms and Conditions apply. Speak to a Course Advisor for full information on the options available to you.

Career Path

This course will be helpful to anyone looking to deepen their foundational understanding of key information security concepts.