With successful completion of the course students should be able to:
- Describe the nature of security risk in a business and an IT context
- Compare and apply several models for security risk assessment
- Facilitate a risk assessment process and gain consensus on risk-based decisions
- Incorporate risk assessment into an IT security plan