The course discuss the method to identify the threats, list the critical assets at risk and identify vulnerabilities those can be exploited.
The risk assessment process comprises of three key steps including Risk Identification, Risk Analysis and Risk Evaluation
Risk management policy and strategy along with security planning and countermeasures. .