Course Outline
Day 1 Introduction to ISO 27005, concepts and implementation of a risk management program
- Section 01: Course objectives and structure
- Section 02: Standard and regulatory framework
- Section 03: Concepts and definitions of risk
- Section 04: Implementing a risk management programme
- Section 05: Context establishment
Day 2 Risk identification, evaluation, and treatment as specified in ISO 27005
- Section 06: Risk Identification
- Section 07: Risk Analysis
- Section 08: Risk Evaluation
- Section 09: Risk Assessment with a quantitative method
- Section 10: Risk Treatment
Day 3 Information Security Risk Acceptance, Communication, Consultation, Monitoring and Review
- Section 11: Information security risk acceptance
- Section 12: Information security risk communication and consultation
- Section 13: Information security risk monitoring and review
Day 4 Risk Assessment Methodologies
- Section 14: OCTAVE Method
- Section 15: MEHARI Method
- Section 16: EBIOS Method
- Section 17: Harmonized Threat and Risk Assessment (TRA) Method
- Section 18: Applying for certification and closing the training
Day 5 Certification Exam
Requirements
A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.
Testimonials (4)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.