SETC Training844-434-7382
 Find a Course: 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

Business Analysis Training

On behalf of the section here at CBSA I would like to thank you for putting in that extra effort to ensure that the course was a resounding success. Your concern for the participants getting the most out of the course was self-evident and very much appreciated. The participants found the extra day of lab time very worthwhile
Comment from CBSA

1. Title

  • Risk Management for IT Professionals (SRISK, 2 days)
    View PDF

2. Course Pre-requisites

  • Previous Experience in an Business Environment

3. Target Audience

  • Business Professionals who want to design and implement effective risk management for their IT Projects

4. Dates and Pricing

2 People for Guaranteed Live or Virtual Delivery $1,150.00 per person

5. Outline

Module 1: Key Concepts

Topic 1: Defining Risk and Risk Mitigation

Topic 2: About Hazards and Threats

Topic 3: About Risk Types

Topic 4: About Risk Management

Topic 5: Different Risk Analysis Techniques

Topic 6: About Monitoring and Control

Module 2: The Risk Assessment Process

Topic 1: Planning for a Risk Assessment

Topic 2: Preparing for the Risk Assessment

Topic 3: Creating the Risk Management Plan

Topic 4: Setting up Reporting

Topic 5: Updating Key Components

Module 3: Risk Assessment Techniques

Topic 1: About the Preliminary Hazards Analysis

Topic 2: Performing Change Analysis

Topic 3: Performing FMEA

Topic 4: Performing a HAZOP Study

Topic 5: Using the SWIFT Technique

Topic 6: Causal and Frequency Analysis

Topic 7: Barriers Analysis

Topic 8: Human Reliability Analysis

Topic 9: Uncertainty and Sensitivity Analysis

Topic 10: Other Useful Techniques

Module 4: Risk Assessment, Processes and Documentation

Topic 1: Risk and Availability Management

Topic 2: Risk and Information Security Management

Topic 3: Risk and IT Service Continuity Management

Topic 4: About Fault Tree Analysis

Topic 5: Performing a Business Impact Assessment

Topic 6: Creating an Information Security Policy

Topic 7: Creating an IT Services Continuity Plan

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette