Using Risk Management ToolsYou must be logged in to view this content. Course Content Expand All | Collapse All Lessons Status 1 Introduction 2 Understanding Risk Management Threats and Threat Assessments/Vulnerabilities Risk Management Risk Assessment Quantitative Risk Assessment Qualitative Risk Assessment Risk Registers/Supply Chain Assessment 3 Comparing Scanning and Testing Tools Password Crackers Network Scanners Network Mapping/Wireless Scanners/Rogue System Detection/Banner Grabbing Vulnerability Scanning Credentialed VS Non-Credentialed/Configuration Compliance Scanner Penetration Testing Intrusive VS Non-Intrusive Testing/Passive VS Active Tools/Exploitation Frameworks 4 Using Security Tools Sniffing with a Protocol Analyzer Command-Line Tools Monitoring Logs for Event Anomalies SIEM Continuous Monitoring/Usage & Permission Auditing and Reviews 5 Using Risk Management Tools Exam Topic Review