ISO/IEC 27005 Risk Manager

Why should you attend?

ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.

After understanding all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a Certified ISO/IEC 27005 Risk Manager” credential. By holding a Risk Manager Certificate, you will be able to demonstrate that you have the necessary skills and knowledge to perform an optimal Information Security Risk Assessment and timely manage Information Security risks.

 

Who should attend?

  • Information Security risk managers
  • Information Security team members
  • Individuals responsible for Information Security, compliance, and risk within an organization
  • Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
  • IT consultants
  • IT professionals
  • Information Security officers
  • Privacy officers

 

Learning objectives

  • Acknowledge the correlation between Information Security risk management and security controls
  • Understand the concepts, approaches, methods and techniques that enable an effective risk management process according to ISO/IEC 27005
  • Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
  • Acquire the competence to effectively advise organizations in Information Security Risk Management best practices

 

Educational approach

  • This training is based on both theory and best practices used in Information Security Risk Management
  • Lecture sessions are illustrated with examples based on cases studies
  • Practical exercises are based on a case study which includes role playing and discussions
  • Practice tests are similar to the Certification Exam

 

Prerequisites

A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.

Course agenda

Day 1: Introduction to ISO/IEC 27005 and implementation of a risk management programme

Day 2: Information security risk assessment, risk treatment and acceptance as specified in ISO/IEC 27005

Day 3: Risk communication, consultation, monitoring, review and risk assessment methods

Examination

The Certified ISO/IEC 27005 Risk Manage exam fully meets the requirements of the Examination and Certification Programme (ECP). The exam covers the following competency domains:

Domain 1: Fundamental principles and concepts of Information Security Risk Management

Domain 2: Implementation of an Information Security Risk Management program

Domain 3: Information Security risk management framework and process based on ISO/IEC 27005

Domain 4: Other Information Security risk assessment methods

For more information about exam details, please visit Examination Rules and Policies

Certification

After successfully completing the exam, you can apply for the credentials shown on the table below. You will receive a certificate once you comply with all the requirements related to the selected credential. For more information about ISO/IEC 27005 certifications and the certification process, please refer to the Certification Rules and Policies..

The requirements for Manager Certifications are:

Credential Exam Professional experience Risk Management experience Other requirements
Certified ISO/IEC 27005 Provisional Risk Manager Certified ISO/IEC 27005 Risk Manager exam or equivalent None None Signing the Code of Ethics
Certified ISO/IEC 27005 Risk Manager Certified ISO/IEC 27005 Risk Manager exam or equivalent Two years: One year of work experience in ISRM Information Security Risk Management activities: a total of 200 hours Signing the Code of Ethics

To be considered valid, the information security activities should follow best implementation and management practices and include the following:

1.Defining a risk management approach

2.Designing and implementing an overall risk management process for an organization

3.Defining risk evaluation criteria

4.Performing risk assessment

5.Identifying assets, threats, existing controls, vulnerabilities and consequences (impacts)

6.Assessing consequences and incident likelihood

7.Evaluating risk treatment options

8.Selecting and implementing Information Security controls

9.Performing risk management reviews

General Information

  • Certification fees are included on the exam price
  • Training material containing over 350 pages of information and practical examples will be distributed
  • A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
  • In case of exam failure, you can retake the exam within 12 months for free

Signup to our Newsletter!

You will always be updated on news and courses of our company