Description
Why should you attend?
ISO/IEC 27005 Lead Risk Manager preparation authorizes you to achieve the essential knowledge to support an institution in the risk administration process had a connection with all properties of pertinence for Information Security utilizing the ISO/IEC 27005 standard as a remark foundation. During this preparation course, you will gain inclusive information of a process model for plotting and cultivating an Information Security Risk Management program. The preparation will still hold an all-encompassing understanding of best practices of risk estimate orders in the way that OCTAVE, EBIOS, MEHARI, and harmonized TRA. This preparation course supports the exercise process of the ISMS Foundation bestowed in the ISO/IEC 27001 standard.
After learning all the inevitable ideas of Information Security Risk Management established ISO/IEC 27005, you can pause the test and command a “PECB Certified ISO/IEC 27005 Lead Risk Manager” attestation. By property a PECB Lead Risk Manager Certificate, you will be able to have or do show that you have the experienced information and professional potential to support and lead a crew in directing Information Security Risks.
Who should attend?
- Information Security risk managers.
- Information Security group appendages
- Individuals are responsible for the reason for Information Security, agreement, and risk inside arranging.
- Individuals executing ISO/IEC 27001, pursuing to obey ISO/IEC 27001 or complicated in a risk administration program.
- IT consultants.
- IT professionals
- Information Security civil servants.
- Privacy Officers
Learning objectives:
- Master the ideas, approaches, orders, and methods that authorize a direct risk administration process established ISO/IEC 27005.
- Acknowledge the equivalence betwixt Information Security risk administration and freedom controls.
- Learn by virtue of what to define the necessities of ISO/IEC 27001 in Information Security Risk Management.
- Acquire the ability and abilities to efficiently warn arrangements on Information Security Risk Management best practices.
- Acquire the information unavoidable for the exercise, administration, and sustenance of a continuous risk administration program
Educational approach
- This preparation is established two together hypotheses and best practices secondhand in Information Security Risk Management.
- Lecture meetings are pictorial accompanying models established cases studies.
- Practical exercises have established a record of what happened that contains part risking and considerations.
- Practice tests are analogous to the Certification Exam
Prerequisites:
A fundamental understanding of ISO/IEC 27005 and inclusive information of Risk Assessment and Information Security.