Course Outline
1. Introduction to risk management
2. Risk assessment methodologies
3. The ISO 27005 information security risk management framework and process model
4. Classification and identification of information assets
5. Definition of threats to information assets
6. Identification of the vulnerabilities these threats might exploit
7. Risk analysis: risk scoring using scales and simple calculations
8. An introduction to risk analysis tools
9. Risk evaluation and acceptance strategies
10. Risk treatment and the selection of mitigating control measures
11. Review and continual improvement of risk assessment and management
12. Risk communications and consultation
13. Integrating the ISO 27005 information security risk management framework into an ISO 27001 ISMS
Testimonials (5)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.