ISO 27005 Risk Manager Course

ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.

Course objectives:

  • Acknowledge the correlation between Information Security risk management and security controls
  • Understand the concepts, approaches, methods and techniques that enable an effective risk management process according to ISO/IEC 27005
  • Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
  • Acquire the competence to effectively advise organizations in Information Security Risk Management best practices

Audience:

  • Information Security risk managers
  • Information Security team members
  • Individuals responsible for Information Security, compliance, and risk within an organization
  • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
  • IT consultants
  • IT professionals
  • Information Security officers
  • Privacy officers

Prerequisites:

A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.

Content:

  • Introduction to Information Security controls as recommended by ISO/IEC 27002

    1. Course objectives and structure
    2. Concepts and definitions of risk
    3. Standard and regulatory framework
    4. Implementing a risk management programme
    5. Understanding the organization and its context
  • Implementation of a risk management process based on ISO/IEC 27005

    1. Risk identification
    2. Risk analysis and risk evaluation
    3. Risk assessment with a quantitative method
    4. Risk treatment
    5. Risk acceptance and residual risk management
    6. Information Security Risk Communication and Consultation
    7. Risk monitoring and review
  • Overview of other Information Security risk assessment methods and Certification Exam

    1. OCTAVE Method
    2. MEHARI Method
    3. EBIOS Method
    4. Harmonized Threat and Risk Assessment(TRA) Method
    5. Certification test
    • Written exam
    • Duration: 2 hour (+ 20 min extra time for non-native)


    The exams are “open book”; candidates are only authorized to use the following reference materials:

    • A copy of the standard (candidates need to bring their own copy of the standard).
    • Course notes from the Participant Handout. (If applicable)
    • Any personal notes made by the student during the course. (If applicable)
    • A hard copy dictionary

    Exam preparation guides

    Examination rules and policies