ISO 27005 Risk Manager Course

ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.

«The trainer was the main reason I learned something valuable; made the class entertaining and fronted good discussions.» Course delegate

Course objectives:

  • Acknowledge the correlation between Information Security risk management and security controls
  • Understand the concepts, approaches, methods and techniques that enable an effective risk management process according to ISO/IEC 27005
  • Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
  • Acquire the competence to effectively advise organizations in Information Security Risk Management best practices

Audience:

  • Information Security risk managers
  • Information Security team members
  • Individuals responsible for Information Security, compliance, and risk within an organization
  • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
  • IT consultants
  • IT professionals
  • Information Security officers
  • Privacy officers

Prerequisites:

A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.

Content:

  • Introduction to Information Security controls as recommended by ISO/IEC 27002

    1. Course objectives and structure
    2. Concepts and definitions of risk
    3. Standard and regulatory framework
    4. Implementing a risk management programme
    5. Understanding the organization and its context
  • Implementation of a risk management process based on ISO/IEC 27005

    1. Risk identification
    2. Risk analysis and risk evaluation
    3. Risk assessment with a quantitative method
    4. Risk treatment
    5. Risk acceptance and residual risk management
    6. Information Security Risk Communication and Consultation
    7. Risk monitoring and review
  • Overview of other Information Security risk assessment methods and Certification Exam

    1. OCTAVE Method
    2. MEHARI Method
    3. EBIOS Method
    4. Harmonized Threat and Risk Assessment(TRA) Method
    5. Certification test
  • The exam is will take place at the end of the course on onsite classroom courses

    For Virtual courses we will send out a voucher that gives you access to an online exam. This can be booked and taken home monitored by a proctor via camera. More information about the exam rules will be send from PECB

    • Duration: 2 hour (+ 20 min extra time for non-native)


    The exams an Multiple Choice exam; candidates are only authorized to use the following reference materials:

    • A copy of the standard (candidates need to bring their own copy of the standard).
    • Course notes from the Participant Handout. (If applicable)
    • Any personal notes made by the student during the course. (If applicable)
    • A hard copy dictionary

    Exam preparation guides

    Examination rules and policies

     

Andre relevante kurs

30. november
2 dager
Classroom Virtual
1 dager
Classroom
16. oktober
5 dager
Classroom Virtual Startgaranti
9. oktober
5 dager
Classroom Virtual Startgaranti