Security and Risk Management

This course is part of CISSP Certified Information Systems Security Professional Specialization

Instructor: Packt - Course Instructors

What you'll learn

  •   Apply security control frameworks such as ISO and NIST in real-world scenarios.
  •   Evaluate risks, threats, and vulnerabilities to manage and mitigate them effectively.
  •   Create business continuity and disaster recovery plans tailored to organizational needs.
  •   Ensure compliance with global and U.S. legal regulations through analysis and application.
  • Skills you'll gain

  •   NIST 800-53
  •   Business Continuity Planning
  •   Cyber Risk
  •   Business Risk Management
  •   Cyber Governance
  •   Risk Analysis
  •   Cyber Security Strategy
  •   Continuous Monitoring
  •   Risk Management
  •   Governance Risk Management and Compliance
  •   Security Controls
  •   Compliance Management
  •   Threat Modeling
  •   Regulation and Legal Compliance
  •   ISO/IEC 27001
  •   Cybersecurity
  •   Security Management
  •   Cyber Security Policies
  •   Security Strategy
  •   Threat Management
  • There are 2 modules in this course

    You'll gain critical insights into regulatory and compliance issues, learning how legal systems impact security strategies globally and in the U.S. The course also covers security control frameworks, helping you understand the application of security governance in real-world scenarios. From security awareness and personnel policies to risk analysis and business continuity, this course provides a thorough approach to developing secure environments. By the end, you’ll be adept in identifying and responding to security risks, implementing robust controls, and conducting continuous monitoring. Whether your goal is CISSP certification or advancing your career in information security, this course equips you with practical and exam-ready knowledge for success. This course is designed for IT professionals, security managers, and cybersecurity enthusiasts aiming for CISSP certification. Familiarity with basic IT security concepts is recommended but not required.

    Risk Management and Business Continuity in Information Security

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved