Course Slides

$0.00

PowerPoint slides covering all chapters of the text created by Professor Michele Varin, Bryant University. These slides may be useful to anyone teaching a security risk assessment class based on the Security Risk Assessment Handbook. Includes the following:

  • Chapter 1: Introduction

  • Chapter 2: Basics

  • Chapter 3: Project Defintion

  • Chapter 4: Security Risk Assessment Preparation

  • Chapter 5: Data Gathering (2 parts)

  • Chapter 6: Administrative Data Gathering (3 parts)

  • Chapter 7: Technical Data Gathering (2 parts)

  • Chapter 8: Physical Data Gathering (2 parts)

  • Chapter 9: Security Risk Analysis (3 parts)

  • Chapter 10: Security Risk Analysis Worked Examples (2 parts)

  • Chapter 11: Security Risk Mitigation

Add To Cart

PowerPoint slides covering all chapters of the text created by Professor Michele Varin, Bryant University. These slides may be useful to anyone teaching a security risk assessment class based on the Security Risk Assessment Handbook. Includes the following:

  • Chapter 1: Introduction

  • Chapter 2: Basics

  • Chapter 3: Project Defintion

  • Chapter 4: Security Risk Assessment Preparation

  • Chapter 5: Data Gathering (2 parts)

  • Chapter 6: Administrative Data Gathering (3 parts)

  • Chapter 7: Technical Data Gathering (2 parts)

  • Chapter 8: Physical Data Gathering (2 parts)

  • Chapter 9: Security Risk Analysis (3 parts)

  • Chapter 10: Security Risk Analysis Worked Examples (2 parts)

  • Chapter 11: Security Risk Mitigation

PowerPoint slides covering all chapters of the text created by Professor Michele Varin, Bryant University. These slides may be useful to anyone teaching a security risk assessment class based on the Security Risk Assessment Handbook. Includes the following:

  • Chapter 1: Introduction

  • Chapter 2: Basics

  • Chapter 3: Project Defintion

  • Chapter 4: Security Risk Assessment Preparation

  • Chapter 5: Data Gathering (2 parts)

  • Chapter 6: Administrative Data Gathering (3 parts)

  • Chapter 7: Technical Data Gathering (2 parts)

  • Chapter 8: Physical Data Gathering (2 parts)

  • Chapter 9: Security Risk Analysis (3 parts)

  • Chapter 10: Security Risk Analysis Worked Examples (2 parts)

  • Chapter 11: Security Risk Mitigation