We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training

Course 1 - Introducing Security and Aligning Asset Management to Risk Management

In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process.

Read more

Course 1 - Introducing Security and Aligning Asset Management to Risk Management

In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process.

Course 1 Learning Objectives

After completing this course, the participant will be able to: 

L1.1 - Classify information security and security concepts.  

L1.2 - Summarize components of the asset management lifecycle. 

L1.3 - Identify common risks and vulnerabilities. 

L1.4 - Provide examples of appropriate risk treatment. 

Course Agenda

Module 1: Understand Security Concepts (Domain 1 - Security Operations and Administration)

Module 2: Participate in Asset Management (Domain 1 - Security Operations and Administration)

Module 3: Understand the Risk Management Process (Domain 3 - Risk Identification, Monitoring and Analysis)

Module 4: Understand the Risk Treatment Process (Domain 3 - Risk Identification, Monitoring and Analysis)

Who Should Take This Course: Beginners

Experience Required: No prior experience required

Enroll now

What's inside

Syllabus

Module 1: Understand Security
One of the first questions we should ask is, what is information security? Information security can have completely different meanings for different people. 
Read more
Module 2: Participate in Asset Management
Asset management deals with the protection of valuable assets to the organization as those assets progress through their lifecycle. Therefore, we need to address the security of assets all through the stages of their lifecycle including creation/collection, identification and classification, protection, storage, usage, maintenance, disposal, retention/archiving and defensible destruction of assets. To properly protect valuable assets, such as information, an organization requires the careful and proper implementation of ownership and classification processes, which can ensure that assets receive the level of protection based on their value to the organization.  The enormous increase in the collection of personal information by organizations has resulted in a corresponding increase in the importance of privacy considerations. As a result, privacy protection constitutes an important part of asset security.  Appropriate security controls must be chosen to protect the asset as it progresses through its lifecycle, bearing in mind the requirements of each phase and the handling requirements throughout. 
Module 3: Understand the Risk Management Process
In this module we begin to look at the risk management process. Risk management is a critical component of an information security program since it drives the selection of controls used to mitigate business and IT risk. The risk management program manages risk, but it does not eliminate it. All activities have an element of risk associated with them (even doing nothing is risky business), so risk management must be an essential part of every organization’s management and operational plans.  In the IT department, we tend to see risk from a negative viewpoint; it represents the problems and inconvenience associated with IT systems failure. We see risk as what happens when something goes wrong, and we are under pressure to fix the problem as quickly as possible. However, in the rest of the business, risk is seen as opportunity — the chance to take a risk and make a return on investment — and the larger the risk, the greater the possible reward (or loss).  First, a definition of risk is a measure of the extent to which an entity is threatened by a potential circumstance or event. It is often expressed as a combination of (1) the adverse impacts that would arise if the circumstance or event occurs, and (2) the likelihood of occurrence.   Note that information system-related security risks are those risks that arise from the loss or compromise of any of the information security attributes (CIANA+PS) required of information or information systems. It reflects the potential adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the nation.  We see from this definition (which is, first of all, IT based) that risk is associated with threats, impact, and likelihood. But this definition also states that IT risk is a subset of business risk and must be measured by the impact of the risk event on organizational operations, assets, and other third parties. 
Module 4: Understand the Risk Treatment Process
The next step after gaining an understanding of the context for the risk management effort (through the Risk Frame process) is to perform the risk assessment. Risk assessment is the process of identifying risk and then evaluating and prioritizing risk based on the level of importance (severity) of the risk. The final deliverable from the risk assessment process is to communicate risk to management often through a Risk Assessment Report (RAR) and by updating the risk register.
Module 5: Chapter 1 Review
Chapter 1 has shown us how information security exists to support the organization in achieving its goals and priorities by protecting its vital information assets. In doing so, the information security team starts with some very fundamental ideas about information security and applies these to understand the potential risks to those assets. We’ve looked at the most important attributes or characteristics of information security, which the mnemonic CIANA+PS represents: confidentiality, integrity, availability, non-repudiation, authenticity, privacy, and safety. These are the touchstones, the criteria, by which we as information security specialists must measure our successes and our failures.  Managing information risk is a primary part of the information security job. Chapter 1 has begun the process of showing us how to manage these risks, within the framework and context of how the organization manages its information assets. Subsequent chapters and their activities will continue to examine these ideas and concepts.  Last, but certainly not least, chapter 1 reminds us that we are members of the professional cadre of information security specialists. Businesses and governments, as well as individuals and organizations, must be able to trust that their day-to-day activities are using reliable, trustworthy information as their fuel. The ethical duties of due care and due diligence, which we examined in this chapter, provide each of us with the guideposts needed as we put our skills and knowledge to work.  In chapter 2, we examine the actions needed to develop a security culture within the organization. We will delve into using policies to enforce security requirements and how we can safeguard our information systems and ensure their use only by authorized users. 

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Helps learners understand the fundamentals of information security
Strong foundation for beginners, helping them grasp the basics of security concepts
Relevant to the Risk Management and Information Security fields
Taught by recognized experts in the information security field
Could be more engaging with the inclusion of more hands-on activities and interactive materials

Save this course

Save Introducing Security: Aligning Asset and Risk Management to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Introducing Security: Aligning Asset and Risk Management with these activities:
Review prior coursework
Complete this activity to refresh your memory on information security principles
Browse courses on Security Concepts
Show steps
  • Review notes and slides from previous information security courses
  • Go through practice questions or quizzes on information security topics
Watch online video tutorials on information security
Expand your understanding of information security concepts through guided online tutorials
Browse courses on Security Concepts
Show steps
  • Search for and identify reputable online video tutorials on information security
  • Watch the tutorials and take notes on key concepts
  • Complete any practice exercises or quizzes associated with the tutorials
Participate in online discussion forums or study groups
Engage with peers to discuss information security concepts and best practices
Browse courses on Information Security
Show steps
  • Identify relevant online discussion forums or study groups focused on information security
  • Join the forums or groups and actively participate in discussions
  • Share your knowledge and insights, and seek clarification on concepts you need help with
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice information security risk assessment exercises
Gain practical experience in conducting information security risk assessments
Browse courses on Risk Management
Show steps
  • Find sample risk assessment scenarios or case studies online or in textbooks
  • Conduct a risk assessment for each scenario, identifying potential risks and their impact
  • Review your results and compare them to examples or solutions provided
  • Identify areas for improvement in your risk assessment skills
Read 'Information Security Risk Assessment' by Thomas R. Peltier
Gain in-depth knowledge of information security risk assessment methodologies
Show steps
  • Read the book thoroughly and take notes on key concepts
  • Complete any practice exercises or case studies included in the book
  • Summarize the main takeaways from the book and how they apply to your learning
Develop an information security risk management plan
Demonstrate your ability to apply information security risk management principles
Browse courses on Risk Management
Show steps
  • Identify the scope and objectives of your risk management plan
  • Conduct a risk assessment to identify and analyze potential risks
  • Develop risk mitigation strategies and controls
  • Create a risk management plan document outlining your findings and recommendations
Contribute to open-source information security projects
Gain hands-on experience and stay up-to-date with industry trends
Browse courses on Information Security
Show steps
  • Identify open-source information security projects that align with your interests
  • Review the project documentation and contribute code or documentation
  • Collaborate with other contributors and learn from their expertise
Mentor junior or aspiring information security professionals
Reinforce your learning by sharing your knowledge and experience with others
Browse courses on Information Security
Show steps
  • Identify opportunities to mentor others through online platforms or local organizations
  • Provide guidance and support to mentees on information security concepts and career development
  • Reflect on your mentoring experiences and identify areas for improvement

Career center

Learners who complete Introducing Security: Aligning Asset and Risk Management will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
CISOs are responsible for the overall information security of an organization. They develop and implement security policies and procedures, and they oversee the implementation of security controls. This course may be useful for someone who wants to become a CISO because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security management, security auditing, and security incident response, which are all important for CISOs to know.
Risk Manager
Risk Managers identify and assess risks to an organization's assets. They work with other departments to develop and implement risk management plans, and they monitor the organization's risk exposure. This course may be useful for someone who wants to become a Risk Manager because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as risk assessment, risk management, and risk reporting, which are all important for Risk Managers to know.
Information Governance Officer
Information Governance Officers are responsible for developing and implementing an organization's information governance policies and procedures. They work with other departments to identify and assess risks to the organization's information, and they develop and implement policies and procedures to mitigate those risks. This course may be useful for someone who wants to become an Information Governance Officer because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as information governance, information management, and information security, which are all important for Information Governance Officers to know.
Business Continuity Planner
Business Continuity Planners develop and implement plans to ensure that an organization can continue to operate in the event of a disruption. They work with other departments to identify and assess risks to the organization's operations, and they develop and implement plans to mitigate those risks. This course may be useful for someone who wants to become a Business Continuity Planner because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as business continuity planning, disaster recovery planning, and crisis management, which are all important for Business Continuity Planners to know.
Data Protection Officer (DPO)
DPOs are responsible for protecting the privacy of an organization's data. They develop and implement privacy policies and procedures, and they oversee the implementation of privacy controls. This course may be useful for someone who wants to become a DPO because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as privacy law, privacy assessment, and privacy management, which are all important for DPOs to know.
Security Manager
Security Managers are responsible for the overall security of an organization's information systems. They develop and implement security policies and procedures, and they oversee the implementation of security controls. This course may be useful for someone who wants to become a Security Manager because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security management, security auditing, and security incident response, which are all important for Security Managers to know.
Security Operations Manager
Security Operations Managers are responsible for managing the day-to-day operations of an organization's security program. They work with other IT professionals to identify and assess risks to data and systems, and they develop and implement security controls to mitigate those risks. This course may be useful for someone who wants to become a Security Operations Manager because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security operations, security incident response, and security monitoring, which are all important for Security Operations Managers to know.
Privacy Officer
Privacy Officers are responsible for protecting the privacy of an organization's data. They develop and implement privacy policies and procedures, and they oversee the implementation of privacy controls. This course may be useful for someone who wants to become a Privacy Officer because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as privacy law, privacy assessment, and privacy management, which are all important for Privacy Officers to know.
Compliance Officer
Compliance Officers are responsible for ensuring that an organization complies with all applicable laws and regulations. They work with other departments to develop and implement compliance policies and procedures, and they monitor the organization's compliance with those policies and procedures. This course may be useful for someone who wants to become a Compliance Officer because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as compliance law, compliance assessment, and compliance management, which are all important for Compliance Officers to know.
Incident Responder
Incident Responders are responsible for responding to security incidents. They work with other IT professionals to identify and assess the impact of security incidents, and they develop and implement plans to mitigate the damage caused by those incidents. This course may be useful for someone who wants to become an Incident Responder because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security incident response, forensics, and threat intelligence, which are all important for Incident Responders to know.
Security Architect
Security Architects design and implement security solutions for organizations. They work with other IT professionals to identify and assess risks to data and systems, and they develop and implement security controls to mitigate those risks. This course may be useful for someone who wants to become a Security Architect because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security architecture, security engineering, and security testing, which are all important for Security Architects to know.
Security Engineer
Security Engineers design, implement, and manage security systems for organizations. They work with other IT professionals to identify and assess risks to data and systems, and they develop and implement security controls to mitigate those risks. This course may be useful for someone who wants to become a Security Engineer because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security architecture, security engineering, and security testing, which are all important for Security Engineers to know.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their information security posture. They work with clients to assess risks, develop security plans, and implement security controls. This course may be useful for someone who wants to become a Security Consultant because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security assessment, security planning, and security management, which are all important for Security Consultants to know.
IT Auditor
IT Auditors evaluate the effectiveness of an organization's information security controls. They work with other IT professionals to identify and assess risks to data and systems, and they make recommendations for improvements to security controls. This course may be useful for someone who wants to become an IT Auditor because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as auditing techniques, security assessment, and security reporting, which are all important for IT Auditors to know.
Information Security Analyst
Information Security Analysts work to protect the information security of an organization's computer networks and systems. They do this by identifying and assessing risks to data and systems, developing and implementing security controls, and monitoring and responding to security incidents. This course may be useful for someone who wants to become an Information Security Analyst because it provides a foundation in information security concepts, asset management, and risk management. The course also covers topics such as security policies and procedures, access control, and cryptography, which are all important for Information Security Analysts to know.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Introducing Security: Aligning Asset and Risk Management.
Comprehensive study guide for the CISSP certification exam. It covers all of the topics on the exam, including security risk management, security engineering, and security operations.
Provides a comprehensive and practical overview of information security, covering topics such as information security risk management, security controls, and incident response. Serves as a good textbook for beginners or those seeking a general overview.
Provides a comprehensive overview of information security, covering topics such as security principles, security technologies, and security management. It valuable resource for individuals preparing for the CISSP certification.
Provides a comprehensive overview of ethical issues in information technology, including topics such as privacy, intellectual property, and social responsibility. Offers a valuable complement to the course's coverage of ethical considerations in information security.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and network security protocols. Offers a good foundation for readers interested in pursuing these topics in more depth.
Textbook on computer security, covering topics such as security threats, security controls, and risk management. It valuable resource for individuals preparing for the CISSP certification.
Textbook on computer security, covering topics such as security threats, security controls, and risk management. It valuable resource for individuals preparing for the CISSP certification.
Provides a comprehensive overview of network security, covering topics such as network security threats, network security controls, and network security standards. It valuable resource for individuals preparing for the CISSP certification.
Provides insights into the human element of security, and how attackers use social engineering techniques to compromise information systems. It valuable resource for individuals preparing for the CISSP certification.
This magazine provides articles on information security management. It valuable resource for individuals preparing for the CISSP certification.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser