Information Security Training Program

 

ISO/IEC 27005 Professional

The ISO/IEC 27005 Professional course offered by Agility Business Services is an advanced-level training program designed to equip participants with a thorough understanding of the ISO/IEC 27005 guidelines. This course delves into the guidelines for establishing, implementing, managing, improving, and evaluating an Information Security Risk Management (ISRM) system.

Course Outline

  • Information Security Background
  • Risk Management Background
  • Information Security Risk
  • Information Security Risk Management Process based on ISO 27005 Standard
  • Statement of Applicability and Risk Management
  • Risk Heat Maps
  • Context establishment
  • Information Security Risk Management
  • Process Basic Criteria
  • Information Security Risk Management
  • Scope and Boundaries
  • Defining the Organizations Structure
  • Information Security Risk Assessment Approaches
  • Identification of Information Security Risks
  • Information Security Risk Analysis
  • Evaluation of Information Security Risks
  • Risk Treatment Options and Techniques for Selecting such Options
  • Risk Treatment Plan Development and Residual Risk Evaluation
  • Acceptance of Information Security Risks
  • Risk Recording and Reporting
  • Overview of Risk Communication and Consultation
  • Risk Communication and Consultation Phases and Plan
  • Risk Communication and Consultation Techniques
  • Overview of the Risk Monitoring and Review Process
  • Monitoring, Reviewing and Improving the Information Security Risk Management Process
Learning Objectives
  • Be familiar with the purpose of an information security risk management process, including basic concepts, principles, and other risk management frameworks.
  • Be familiar with the information security risk management process, steps, and activities.
  • Identify, assess, and treat the information security risks and perform other related activities.
  • Be familiar with the basic analysis and methods used to establish a risk management context, assess and manage information security risks and implement security controls.
  • Be able to support the information security risk manager in performing risk management activities.
Target Audience
  • Information Security Risk Manager, Team Leader or Technician
  • Risk Analyst, Model Risk Specialist, Risk Manager
  • Business Owner, COO, CIO, CISO
3 Days

05-Feb - 07-Feb 2024

Contact