Reference no: EM133047846
Provide a reflection of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
The course we are talking about us is information security and Risk management and some topics we learn are:
Managing Risk: Threats, Vulnerabilities, and Exploits
Understanding and Maintaining Compliance
Developing a Risk Management Plan
Defining Risk Assessment Approaches
Identifying Assets and Activities to Be Protected
Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Identifying and Analyzing Risk Mitigation Security Controls
Planning Risk Mitigation Throughout an Organization
Turning a Risk Assessment into a Risk Mitigation Plan
Mitigating Risk With a Business Impact Analysis
Mitigating Risk With a Business Continuity Plan
Mitigating Risk With a Disaster Recovery Plan
Mitigating Risk With a Computer Incident Response Team Plan