Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures.
- 5 stars
- 4 stars
来自IDENTIFYING, MONITORING, AND ANALYZING RISK AND INCIDENT RESPONSE AND RECOVERY 的热门评论
this was the best of all the courses that i have gone through i think i might say that now i can be able to detect incidence and recovery by now
Good , i clear all my doubt about security and handling incidents
Course was really helpful for all the security professionals.
Very informative course and the tutor is really good !!!
It is very Informative and the content is helpful in Job
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org
关于 (ISC)² Systems Security Certified Practitioner (SSCP)
该课程是 Coursera 上提供的为数不多的课程之一，目前只对已购买课程或已获得助学金的学生开放。
How long does it take to complete the course?
The course schedule contains approximately 21 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks