SRMC® Level 6
Unit 1: Security Risk Management Frameworks
The SRMC® course has been specially designed by subject experts to provide a comprehensive and diverse learning experience that aims to equip individuals with the practical skills, knowledge and competence to operate confidently, and credibly, as a Security and Risk Management Consultant.
Throughout the distance learning course we enable you to achieve a broad and comprehensive understanding of risk management and its associated practices. The goal is to not only significantly improve your skill set and gain a selection of recognised qualifications, but to also develop your practical understanding and widen your future career opportunities. As an example, many of our former students have gone on to secure senior positions within the 'Big Four' consultancies; Energy and Extractives, Aviation, Defence and Media, as well as other leading risk management organisations. The course will also equip you with the skills required to consult in a broad range of risk management and business practices.
Unit 1 is all about Security and Risk Management. It will focus on various risk and enterprise risk management models, developing frameworks for managing security risk throughout business and the practical risk assessment processes and mitigation measures involved, before finally covering country and regional risk analysis.
Course Welcome
Research, Referencing and Critical Writing
Course Documents
Book 1-to-1 Course Tutor Meetings
Core Resources
Useful Resources
Background Reading
Assignment Writing Resources
Unit 1 Assignment Overview
Unit 1 Assignment Brief
Unit 1 Assignment Template
Annexes A to D
Final Assignment Submission
Introduction to Risk Management
Will Gadd's Risk Secrets
Introduction to ISO 31000
ISO 31000: Risk Management
Enterprise Risk Management
Alternative Risk Management Frameworks and Models
Risk Perception
What is Security Risk Management?
How to Create a Stakeholder Map
The SRM Process
Threat Identification and Assessment
Criticality Assessment
Asset Identification
Vulnerability Assessment
How to Use a Risk Matrix
Analysing Risks
Qualitative & Quantitative Risk Analysis
Evaluating Risks
Risk Appetite Frameworks
Treat the Risks, Monitor & Review
Country Risk Assessments and External Context
Pestle Analysis
Pestle and POST-T
Political Risk Analysis
POST-T Breakdown
Managing Operational Risk
POST-T Breakdown Continued
Why Terrorism Can But Should Not Be Defined
Recognising Terrorist Threats
Country Risk Scores
OSINT - Open Source Intelligence
OSINT and Credible Evidence