Every organization uses its information to support its business operations. When there are threats in the internal and external environments, they create the risk of information loss or damage. This course examines the design and construction of a risk management program, including policies and plans, to support the identification and treatment of risk to the organization’s information assets.
Welcome to A General Approach to Risk Management (Course 2)
This is an overview of the learning objectives for the course.
Building the Risk Management Effort (Module 2.1)
Planning for Risk Management (Module 2.2)
Conducting the RM Process (Module 2.3)
Conducting the RM Process: Risk Treatment (Module 2.4)
Course wrap-up for A General Approach to Risk Management
This is the final module where you will take the Course Assessment.
Michael Whitman, Ph.D., CISM, CISSP and Herbert J. Mattord, Ph.D., CISM, CISSP, CDP