This is a 4 week long course with two online sessions every week combined with homework and a final research paper.

Course Outline

  1. Risk definitions
  2. Qualitative and Quantitative Risk Analysis
  3. Risk Management Lifecycle
  4. Risk identification
  5. Risk analysis and assessment
    1. Estimating likelihood
    2. Estimating control strength
  6. Risk treatment methods
  7. Risk monitoring
  8. Risk Management frameworks
  9. Quantitative risk assessment methods
  10. Risk management practice pitfalls and how to avoid them
  11. RskRgstr – A solution for managing Cybersecurity risk lifecycle

Learning Outcome

After attending this course, participants will be able to understand risk, risk management lifecycle, and put this knowledge to practice.

Instructor and Course Material

This course is delivered by Rafeeq Rehman, a well-known industry veteran and creator or CISO MindMap 

Who should join

Cybersecurity professionals who are, or aspiring to be in risk management field.

About SISARGO Institute

Originally established in 2001 as Conformix, SISARGO Institute is dedicated to research, training, and certification with a focus on information technology.


Announcing Risk Management Course

This 4-week course offers online sessions twice weekly, focusing on risk management in cybersecurity. Topics include Risk Analysis, Risk Management Lifecycle, and practical application techniques in managing cybersecurity risks. Delivered by Rafeeq Rehman at SISARGO Institute, it's tailored for professionals seeking to advance in risk management.

RskRgstr Release Notes, April 28, 2024

Release Notes April 28, 2024 Following are release notes for April 28, 2024. This release includes minor updates that creates a sorted list of findings when displaying an assessment.

On Estimating Control Strength in RskRgstr

While risk assessment may be qualitative, quantitative, estimating “control strength” is an important part of calculating overall risk (especially in qualitative and quantitative methods). To improve consistency and to decrease subjectivity in estimating control strength, I am providing some examples of how to estimate control strength in this article.

What is Defense in Depth?

Defense in depth is a fundamental concept in Cybersecurity. This strategy involves layering multiple security measures to protect against various threats. Imagine a series of concentric circles, each representing a layer of defense, with the innermost circle being the most critical and the outer layers providing additional security.

Major Skill Gaps in Cybersecurity Professionals

ISACA published a report on “State of Cybersecurity 2022” in which they presented their findings on the global workforce. The most striking of all the findings is Figure 14 of the report showing major skill gaps among security professionals.
,

Get a Certificate of Qualified SOC Analyst

Required Skills for a certificate of Qualified Security Operations Center (SOC) Analyst Being an effective Security Operations Center Analyst (SOC Analyst) requires understanding and hands-on skills in many areas of technology as well as…
, ,

Introduction to Data Mining and Machine Learning in Python

This is a programming oriented, hands-on training for starting a career in Data Mining and Machine Learning, and to acquire the necessary skills in statistical and inferential thinking. This course will enable you to pursue a career further…