Course Slides
PowerPoint slides covering all chapters of the text created by Professor Michele Varin, Bryant University. These slides may be useful to anyone teaching a security risk assessment class based on the Security Risk Assessment Handbook. Includes the following:
Chapter 1: Introduction
Chapter 2: Basics
Chapter 3: Project Defintion
Chapter 4: Security Risk Assessment Preparation
Chapter 5: Data Gathering (2 parts)
Chapter 6: Administrative Data Gathering (3 parts)
Chapter 7: Technical Data Gathering (2 parts)
Chapter 8: Physical Data Gathering (2 parts)
Chapter 9: Security Risk Analysis (3 parts)
Chapter 10: Security Risk Analysis Worked Examples (2 parts)
Chapter 11: Security Risk Mitigation
PowerPoint slides covering all chapters of the text created by Professor Michele Varin, Bryant University. These slides may be useful to anyone teaching a security risk assessment class based on the Security Risk Assessment Handbook. Includes the following:
Chapter 1: Introduction
Chapter 2: Basics
Chapter 3: Project Defintion
Chapter 4: Security Risk Assessment Preparation
Chapter 5: Data Gathering (2 parts)
Chapter 6: Administrative Data Gathering (3 parts)
Chapter 7: Technical Data Gathering (2 parts)
Chapter 8: Physical Data Gathering (2 parts)
Chapter 9: Security Risk Analysis (3 parts)
Chapter 10: Security Risk Analysis Worked Examples (2 parts)
Chapter 11: Security Risk Mitigation
PowerPoint slides covering all chapters of the text created by Professor Michele Varin, Bryant University. These slides may be useful to anyone teaching a security risk assessment class based on the Security Risk Assessment Handbook. Includes the following:
Chapter 1: Introduction
Chapter 2: Basics
Chapter 3: Project Defintion
Chapter 4: Security Risk Assessment Preparation
Chapter 5: Data Gathering (2 parts)
Chapter 6: Administrative Data Gathering (3 parts)
Chapter 7: Technical Data Gathering (2 parts)
Chapter 8: Physical Data Gathering (2 parts)
Chapter 9: Security Risk Analysis (3 parts)
Chapter 10: Security Risk Analysis Worked Examples (2 parts)
Chapter 11: Security Risk Mitigation