Implementing and Performing Risk Management with ISO/IEC 27005
Everything you do in information security is related to risk, and no matter your discipline, sharpening your ISRM skills will increase your value. This course will arm you with a practical risk framework and approach to prioritize and address risk.
What you'll learn
Information security is a broad discipline, and security teams are increasingly strapped for time and resources. In this course, Implementing and Performing Risk Management with ISO/IEC 27005, you will find a practical framework to prioritize and orchestrate a comprehensive information security risk framework. First, you will learn about the internationally accepted risk management standard ISO/IEC 27005. Next, you will arm yourself with skills to establish the business risk context, assess business risks, and perform risk treatment. Finally, you will be equipped with meaningful approaches to effectively communicate and monitor your organization's risk. When you're finished with this course, you will have the knowledge and blueprint to coordinate a widely accepted framework and to bolster your organization's information security program.
Table of contents
- Evaluating Risk Assessment 4m
- Identifying and Reviewing Risk 1m
- Identifying and Reviewing Business Assets 5m
- Evaluating Threats to Assets and Business Processes 6m
- Identifying and Evaluating Existing Controls 4m
- Identifying and Assessing Vulnerabilities 4m
- Creating Incident Scenarios and Identifying Consequences 4m
- Conducting Risk Analysis 3m
- Analyzing Risk Consequences 4m
- Analyzing Risk Likelihood 2m
- Analyzing and Determining the Level of Risk 2m
- Conducting Risk Evaluation and Prioritization 4m
- Demo 3m