Select Page
Home / ISO 27005 Risk Manager

ISO 27005 Risk Manager Course Overview | Virtual and Classroom

ISO 27005 Risk Manager Course Overview

Basic Information

  • Net Security Training’s ISO/IEC 27005 enables you to acquire the necessary skills and knowledge to initiate the implementation of an information security risk management process. Therefore, it proves that you are able to identify, assess, analyze, evaluate and treat various information security risks faced by organizations. Moreover, it enables you to support organizations prioritize risks and undertake appropriate actions to reduce and mitigate them.

    The training will help you to properly align organizations Information Security Management system with Information Security Risk Management process. Also, when obtaining the PECB Certified ISO/IEC 27005 Credentials you will be able to help organizations to continually improve an information security risk management process which leads the organization towards achieving its objectives.
     

    Benefits of ISO/IEC 27005 Information Security Risk Management ISO/IEC 27005 Certificate will prove that you have:

    • Gained the necessary skills to support an effective implementation of an information security risk management process in an organization.
    • Acquired the expertise to responsibly manage an information security risk management process and ensure conformity with legal and regulatory requirements.
    • The ability to manage an information security and risk management team.
    • The ability to support an organization to align their ISMS objectives with ISRM process objectives.

Course Syllabus:

 

Day 1 – Information Security controls as recommended by ISO/IEC 27002

  • Course objectives and structure
  • Concepts and definitions of risk
  • Standard and regulatory framework
  • Implementing a risk management programme
  • Understanding the organization and its context

Day 2 – Implementation of a risk management process based on ISO/IEC 27005

  • Risk identification
  • Risk analysis and risk evaluation
  • Risk assessment with a quantitative method
  • Risk treatment
  • Risk acceptance and residual risk management
  • Information Security Risk Communication and Consultation
  • Risk monitoring and review

Day 3 – Overview of other Information Security risk assessment methods and Certification Exam

  • OCTAVE Method
  • MEHARI Method
  • EBIOS Method
  • Harmonized Threat and Risk Assessment (TRA) Method
  • Why should you attend?

    ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.

    After understanding all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27005 Risk Manager” credential. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the necessary skills and knowledge to perform an optimal Information Security Risk Assessment and timely manage Information Security risks.

    Who should attend?

    • Information Security risk managers
    • Information Security team members
    • Individuals responsible for Information Security, compliance, and risk within an organization
    • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
    • IT consultants
    • IT professionals
    • Information Security officers
    • Privacy officers

    Learning objectives

    • Acknowledge the correlation between Information Security risk management and security controls
    • Understand the concepts, approaches, methods and techniques that enable an effective risk management process according to ISO/IEC 27005
    • Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
    • Acquire the competence to effectively advise organizations in Information Security Risk Management best practices

    Educational approach

    • This training is based on both theory and best practices used in Information Security Risk Management
    • Lecture sessions are illustrated with examples based on cases studies
    • Practical exercises are based on a case study which includes role playing and discussions
    • Practice tests are similar to the Certification Exam

Audience to the course:

The CCSK certification – a globally recognized professional requirement in the IT Security domain, is best suited for:

  • Professionals Interested in Obtaining the CCSK Credential
  • IT Security Professionals
  • IT Auditors
  • Managers, Directors and Executives
  • System Architects
  • Compliance Specialists
  • Risk Specialists
  • Business Analysts

Course Enquiry

    Your Name *

    Your Email *

    Course *

    Telephone *

    Your Message