Why should you take this training course?
Risk management is an essential component of any information security program. An effective information security risk management program enables organisations to detect, address, mitigate, and even prevent information security risks.
The ISO/IEC 27005 Lead Risk Manager training course provides an information security risk management framework based on ISO/IEC 27005 guidelines. This also supports the general concepts of ISO/IEC 27001. Participants will receive a thorough understanding of other best risk management frameworks and methodologies, such as OCTAVE, EBIOS, MEHARI, CRAMM, NIST, and Harmonized TRA.
Fees
COURSE OUTLINES
- Training course objectives and structure
- Standards and regulatory frameworks
- Fundamental concepts and principles of information security risk management
- Information security risk management program
- Context establishment
- Risk identification
- Risk analysis
- Risk evaluation
- Risk treatment
- Information security risk communication and consultation
- Information security risk recording and reporting
- Information security risk monitoring and review
- OCTAVE and MEHARI methodologies
- EBIOS method
- NIST framework
- CRAMM and TRA methods
- Closing of the training course
Domain 2: Implementation of an information security risk management program.
Domain 3: Information security risk assessment.
Domain 4: Information security risk treatment.
Domain 5: Information security risk communication, monitoring, and improvement.
Domain 6: Information security risk assessment methodologies.
COURSE DETAILS
- Training material containing over 450 pages of information and practical examples will be distributed.
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued.
- In case of exam failure, you can retake the exam within 12 months for free.
- The training course provides best practices of risk management that will help participants prepare for real-life situations.
- The training course contains essay-type exercises (some of which are based on a case study) and multiple-choice quizzes (some of which are scenario-based).
- Participants are encouraged to communicate and discuss with each other when completing stand-alone and scenario-based quizzes and exercises.
- The structure of the quizzes is similar to the certification exam.
- Explain the risk management concepts and principles based on ISO/IEC 27005 and ISO 31000.
- Establish, maintain, and continually improve an information security risk management framework based on the guidelines of ISO/IEC 27005 and best practices.
- Apply information security risk management processes based on the guidelines of ISO/IEC 27005.
- Plan and establish risk communication and consultation activities.
- Record, report, monitor, and review the information security risk management process and framework.