Kurskode: HPE_HL947S

varighet: 2 Dag(er)

Sted: Virtual, Instructor Led Training
Katergori: Hewlett Packard Enterprise (HPE)

Course Overview

As we’ve learned, Information Security is ultimately about protecting the assets most crucial to your business through preserving the Confidentiality, Integrity, and Availability of your information. In this 3-day course, IT professionals and security officers learn to assess and manage risk in their organization and plan for the unexpected.


Risk management includes recognizing the assets key to your business success, documenting known threats, and their likelihood, calculating the impact of a potential breach and implementing specific controls to avoid breaches or minimize the impact if any occur. Further, for those assets, you identify processes to recover from a breach, and explicitly recognize the remaining risk that you choose to accept.Business continuity and disaster recovery planning extends this by responding when the unexpected happens and preparing to continue conducting business as usual, and as quickly as possible with as little impact on day to day operations. When disaster strikes, how much will it affect your company? Your reputation? Your customers?In this course, you learn to identify and evaluate risk to your highest priority assets, and also how to design, implement, and maintain effective, risk treatment controls. This course is also helpful for those working toward industry certifications like CRISC, ABCP, CFCP, CBCI, Security+ or others.

Module 1: Mapping risk management and

continuity planning to your business • Describe riskmanagement

• Discuss the relationship between security, businesscontinuity management and risk management

• Define risk terms

• Describe the risk equation

• Define the key words relating to BCP/DRP

• Position resiliency in your management strategy

• Describe the types of response strategies

• Describe the role of governance in managing risk andcompliance

Module 2: Making the case for risk management

and business continuity planning • Discuss the importance ofrisk management and the need for BCP/DRP in any environment

• List business considerations and drivers for riskmanagement and business continuity planning

• Determine which drivers apply to your environment

Module 3: Managing risk as a process • Describe the purposeof frameworks, reference models, standards

• List possible risk management models or frameworks as yourguide

• Compare BCP/DRP frameworks for your environment

• Describe the lifecycle of risk management

• Distinguish between risk assessment, risk analysis, andbusiness impact analysis

• Promote the ongoing need for training and plan updates

• Define the activities involved in managing risk

• List responsibilities and potential members for a riskmanagement team

• Define the activities involved in developing andmaintaining a BCP/DRP

• List responsibilities and potential members for a BCP team

• Describe elements of a proposal for board approval

• Identify stakeholders and their concerns

Module 4: Analyzing business impact:

where to focus • List detailed steps to conduct a businessimpact analysis project

• Describe steps to conduct interviews to gather data

• Describe how to increase success with BIA interviewing

• Define analytical terms for business impact and recoveryrequirements

• Explain the process to calculate and document recoveryrequirements for your critical business functions

Module 5: Assessing risk: what threats and

vulnerabilities exist • List the requirements of a riskassessment team

• Describe how to select assessment targets based on BIA

• Outline the steps in a risk assessment project

• Define the scope of an assessment

• Identify what goes into a plan for examination activities(interviews and vulnerability scanning)

• Compare data gathering methods

• Compare risk assessment methods and tools

• List expectations for documenting assessment results

• List steps to mitigate risks of being a risk assessor

Module 6: Analyzing risks: how much it's worth • Comparequantitative and qualitative risk analysis

• Describe methods to calculate quantitative risk

• Define probability classes

Module 7: Documenting risk treatment plans: how

to protect assets • Define risk management strategies

• Describe how to select risk treatment plans (physical,technical, social) appropriate to analysis results

• Describe the importance of documenting a policy to reviewrisk management needs

Course data sheet

Follow us:

Module 8: Planning for resiliency: how to continue

your business

• List the sections of a Business Continuity Plan document

• Describe the BCP’s underlying plans

• List other BC-related plans and their contents

• Position the Disaster Recovery Plan with respect to theBCP

• List key elements for a Disaster Recovery plan

• Compare Disaster Recovery strategies for your company

• Compare levels of redundancy and retention

• Identify roles and responsibilities for recovery teams

• Optimize distribution and utility of documents

Module 9: Implement risk treatment plan • Integrate theproject requirements across risk, BCP, and DRP plans

• Follow project management best practices to implementplans for risk treatment across the organization

• Describe the steps to take during a security incident

• List the elements of a security incident report

• Identify what constitutes an incident

• Describe the process to collect evidence related to anincident

Module 10: Failing back • Discuss what happens when you’reready to go back

• Evaluate the opportunity to upgrade business effectivenessand/or resiliency

• Describe the steps

Module 11: Auditing risk management

implementation and testing BCP procedures

• Differentiate between an audit and an assessment

• Define the characteristics of an audit

• Describe when an audit may be applicable

• Predict evidence requested during an audit process

• Compare risk management audit, compliance audit, and BCPtesting

• Describe the levels of testing for BCP/DRP plans

Module 12: Summary and case study • Test your knowledge

• Given sufficient detail, design an appropriate riskstrategy

Module 13: Business continuity

planning—Next steps

• Ask the right questions to determine where your companycurrently stands

• Champion the need for Business Continuity Planning withyour management

• Determine how much help you need and get it

Students attending this course will:

Describe generalized risk management

lifecycle as starting point in organizational

discussions and how processes fit together

• Identify models/frameworks related

to Risk Management and Business

Continuity Planning/Disaster

Recovery Planning

• Paraphrase the process for business

impact analysis interviews and

calculating values

• Paraphrase the process for assessing and

analyzing risk scenarios quantitatively and

qualitatively

• Outline the contents expected in a Risk

Treatment Plan and BCP/DRP documents

• Participate in risk management

implementation audit

Describe the role of governance in managing

risk and compliance

• Describe management support and

identify team responsibilities. Create and

configure virtual machines in Azure

• Scope the current situation in terms

of documents to gather and questions

to ask

Describe the management requirements to

implement risk and resiliency strategy

• Recognize the scope of potential risk

response and BCP/DRP strategies

appropriate to level of risk

• Categorize investment requirements

Discuss requirements and proposals with

security professional

Begin to prepare for various security-related

certification exams or a security lead positon

• HPE Security Essentials (HL945S) orequivalent knowledge

• New System or Network Administrators

who want to understand how to determine

and manage risk, including an appropriate

business continuity strategy

• IT Professionals who need an overview of

risk management and BCP/DR concepts

and techniques

• Individuals working towards (or

considering) an information security or

risk management-focused certification

• Professionals who want to know more

about risk management because it’s

important for their job as a security

practitioner

• Professionals who want to know more

about business continuity strategies

because everybody needs to be ready for

the unexpected

Kontakt oss: Kurs@sgpartner.no

Kurskode: HPE_HL947S Kategori: , Tag

Relaterte kurs