07314600600
+1-307-387-5278
Courses

Course Package

Exam Voucher by TUV Rheinland

Official Training Material from TUV Rheinland

Official ISO 27005 Lead IT Risk Manager E-Book

Highly Experienced & Accredited Instructor

Live Instructor-Led Sessions

Real Life Examples & Case Studies

Lifetime LMS Access

K-Prime Warranty


 

Target audience for ISO 27005 Lead IT Risk Manager Course

 

  • IT Risk Managers, IT and network professionals

 

Prerequisites:

 

ISO 27005 Exam Preparation and Certification information

 

  • Questions - 70 MCQ Questions 

  • Duration - 2.5 Hours 

  • Pass Marks - 55%  

  • Closed book exam 

  • Online proctored 

  • Free second attempt 

 

ISO 27005 Lead IT Risk Manager Certification Journey 

Other Important Information

 

  • No Labs
  • Course Materials will be provided
  • Exercises and Case scenario-based quiz
  • Mock Audits

 

 

Learning Objectives

Learning objectives of ISO 27005 Lead IT Risk Manager Training

 

  • Risk management concepts and principles based on ISO/IEC 27005 and ISO 31000
  • Establish, maintain, and continually improve an information security risk management framework
  • Apply information security risk management processes based on the guidelines of ISO/IEC 27005
  • Plan and establish risk communication and consultation activities.
  • Record, report, monitor, and review the information security risk management process and framework

Course Outline

Day-1
  • Overview of the information security risk management process 
  • Context establishment (Risk management approach, Risk evaluation criteria, Impact criteria, Risk acceptance criteria) 
  • Scope and boundaries. Organization for information security risk management 
  • Information security risk assessment 
Day-2
  • Risk identification, Identification of assets, Identification of threats, Identification of existing controls, Identification of vulnerabilities, Identification of consequences 
  • Risk analysis (Quantitative and Qualitative), Assessment of consequences, Assessment of incident likelihood, Level of risk determination 
  • Risk evaluation 
Day-3
  • Information security risk treatment 
  • Risk modification, risk retention, risk avoidance and risk sharing 
Day-4
  • Information security risk acceptance