image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

Welcome to this  course on Information Security Risk Management and guidelines of the internationally recognized standard ISO/IEC 27005:2022. In today's interconnected world, safeguarding sensitive information is more critical than ever. Join me to equip yourself with the knowledge and tools to tackle the ever-evolving landscape of information security threats.
The course covers the ISO/IEC 27005:2022 guidelines for managing information security risks, applicable to all types of organizations, regardless of size or sector. We'll explore the fundamental principles of risk management and its practical application in information security. This internationally recognized standard will help establish a robust risk management framework within your organization.
The course is structured into five sections. In the first section, we'll discuss about information security management, the ISO/IEC 27000 series of international standards and I will introduce you to ISO/IEC 27005:2022.
The second section of the course covers context establishment, including the risk appetite of an organization or how to establish criteria for risk acceptance. We'll also discuss the differences between the qualitative and quantitative approaches to defining consequences and likelihood as constitutive elements of risk.
Then, in the third section, we'll explore risk assessment including risk identification, using the approaches proposed by ISO/IEC 27005:2022, the event-based approach and the asset-based approach. Detailed insights into risk analysis, risk evaluation (as steps of the risk assessment) and the role of risk owners are discussed in this section as well.
In section four of the course we will cover risk treatment and the most common options to address information security risks for an organization. We'll discuss about the information security controls from ISO/IEC 27001:2022 and I will tell you about some key documents of an ISMS (Information Security Management System) like the Statement of Applicability (SoA) or the risk treatment plan.
The last section is dedicated to continual improvement in the risk management process, as well as insights on the certification for organizations and for persons in the context of information security.
By the end of this course, you'll possess a solid understanding of the information security risk management process, including threat and vulnerability analysis, risk level calculation or effective risk treatment strategies. Empowered with this knowledge, you can implement a successful risk management program, ensuring the confidentiality, integrity and availability of sensitive data within your organization.
Don't miss this opportunity to boost your expertise in information security risk management and ISO/IEC 27005:2022. Enroll now and upgrade your knowledge and skills to help your company protect its valuable information assets.
Who this course is for:
Information security officers
Information security risk managers and analysts
ISO enthusiasts
Information security auditors and consultants

What you'll learn

What is an information security risk and what is an ISMS

What represents the risk appetite of an organization

How to establish risk acceptance criteria

How to identify information security risks

The relationship between threats and vulnerabilities

How to estimate likelihood and consequence as constitutive elements of risk

How to calculate a risk level

What are the requirements for risk owners and why risks should be owned

Which are the options available for risk treatment

Key documents for an ISMS like the SoA or the risk treatment plan

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Introductive section
5
1.1-Introduction
1.2-Information security management
1.3-The ISO/IEC 27000 series of standards
1.4-About ISO/IEC 27005
1.5-Information security risk management
2-Context establishment
5
2.1-Context establishment
2.2-Risk acceptance criteria
2.3-Criteria for performing information security risk assessments
2.4-Qualitative vs. quantitative approaches part 1
2.5-Qualitative vs. quantitative approach part 2
3-Information security risk assessment
6
3.1-Generic requirements for the information security risk assessment
3.2-The event-based approach to risk identification
3.3-The asset-based approach to risk identification
3.4-Identifying risk owners
3.5-Analyzing information security risks
3.6-Evaluating information security risks
4-Information security risk treatment
5
4.1-Risk treatment options
4.2-Determining the necessary controls
4.3-Preventive, detective and corrective controls
4.4-The Statement of Applicability (SoA)
4.5-The risk treatment plan
5-Considerations about the information security risk management process
4
5.1-More considerations about the information security risk management process
5.2-Continual improvement
5.3-Certification for information security management
5.4-Thank you and good bye!