Course Outline
1. Introduction to risk management
2. Risk assessment methodologies
3. The ISO 27005 information security risk management framework and process model
4. Classification and identification of information assets
5. Definition of threats to information assets
6. Identification of the vulnerabilities these threats might exploit
7. Risk analysis: risk scoring using scales and simple calculations
8. An introduction to risk analysis tools
9. Risk evaluation and acceptance strategies
10. Risk treatment and the selection of mitigating control measures
11. Review and continual improvement of risk assessment and management
12. Risk communications and consultation
13. Integrating the ISO 27005 information security risk management framework into an ISO 27001 ISMS
Testimonials (4)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated
The oral skills and human side of the trainer (Augustin).