ISO 27005 Risk Manager Course

ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.

«The trainer was the main reason I learned something valuable; made the class entertaining and fronted good discussions.» Course delegate

Course objectives:

  • Acknowledge the correlation between Information Security risk management and security controls
  • Understand the concepts, approaches, methods and techniques that enable an effective risk management process according to ISO/IEC 27005
  • Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
  • Acquire the competence to effectively advise organizations in Information Security Risk Management best practices

Audience:

  • Information Security risk managers
  • Information Security team members
  • Individuals responsible for Information Security, compliance, and risk within an organization
  • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
  • IT consultants
  • IT professionals
  • Information Security officers
  • Privacy officers

Prerequisites:

A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.

Certification

After successfully completing the exam, you can apply for the credentials shown on the table below. You will receive a certificate once you comply with all the requirements related to the selected credential. For more information about ISO/IEC 27001 certifications and the PECB certification process, please refer to the Certification Rules and Policies.

 
27005 RM.png
 

Content:

Introduction to Information Security controls as recommended by ISO/IEC 27002

  1. Course objectives and structure
  2. Concepts and definitions of risk
  3. Standard and regulatory framework
  4. Implementing a risk management programme
  5. Understanding the organization and its context

Implementation of a risk management process based on ISO/IEC 27005

  1. Risk identification
  2. Risk analysis and risk evaluation
  3. Risk assessment with a quantitative method
  4. Risk treatment
  5. Risk acceptance and residual risk management
  6. Information Security Risk Communication and Consultation
  7. Risk monitoring and review

Overview of other Information Security risk assessment methods and Certification Exam

  1. OCTAVE Method
  2. MEHARI Method
  3. EBIOS Method
  4. Harmonized Threat and Risk Assessment(TRA) Method
  5. Certification test

The exam is will take place at the end of the course on onsite classroom courses

For Virtual courses we will send out a voucher that gives you access to an online exam. This can be booked and taken home monitored by a proctor via camera. More information about the exam rules will be send from PECB

  • Duration: 2 hour (+ 20 min extra time for non-native)


The exams an Multiple Choice exam; candidates are only authorized to use the following reference materials:

  • A copy of the standard (candidates need to bring their own copy of the standard).
  • Course notes from the Participant Handout. (If applicable)
  • Any personal notes made by the student during the course. (If applicable)
  • A hard copy dictionary

Exam preparation guides

Examination rules and policies

 

Other relevant courses

23. January
2 days
Classroom Virtual Guaranteed to run
1 days
Classroom
27. January
5 days
Classroom Virtual
6. January
5 days
Classroom Virtual