For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation ISO 27005 Training

The ISO 27005 Lead Auditor Training is a comprehensive course that focuses on the principles and practices of Information Security Risk Management, aligned with ISO 27005 standards. This training equips participants with the necessary skills and knowledge to conduct audits of Information Security Risk Management Systems (ISRM). It emphasizes the significance of protecting sensitive information and ensuring the integrity, confidentiality, and availability of data within organizations.

Détails
Objectifs pédagogiques de la formation ISO 27005 Training
  • Provide a detailed understanding of ISO 27005 standards
  • Equip participants with the knowledge to lead Information Security Risk Management audits
  • Guide professionals in conducting assessments and audits according to ISO 27005
  • Enhance participants' skills in assessing risk management processes
  • Prepare individuals for the lead auditor role in information security risk management
  • Ensure participants are well-versed in audit methodologies and compliance with ISO 27005 standards.

Qui devrait suivre cette formation ISO 27005 Training ?

Public visé par la formation ISO 27005 Training

This training is designed for professionals involved in Information Security and Risk Management. The target audience includes Information Security Managers, Risk Managers, Compliance Officers, Internal Auditors, Business Continuity Professionals, Security Analysts, and individuals responsible for conducting audits and assessments within their organizations.

Prérequis de la formation ISO 27005 Training

There are no formal prerequisites for this ISO 27005 Lead Auditor Course. However, participants with a background or familiarity in Information Security and Risk Management will benefit the most from the training.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation ISO 27005 Training


Module 1: Introduction to ISO 27005 Standard

Introduction

Concepts, Key Definitions, and Background

Quality Management System (QMS)

Information Security Risk Management

Role and Importance

Understanding the Situation in an Organisation

Reviewing and Monitoring

Octave Method

EBIOS Method

MEHARI

Harmonised TRA Method


Module 2: Interaction with Other ISO

How ISO 27005 Interacts with ISO 27001?

Quantifying the Business Impact

Impact Severity


Module 3: Planning Individual Internal Audits

Internal Audit Approach

Risk Assurance Mapping

Audit Plan

Research the Audit Area

Conduct Process Walk-Throughs

Map Risks to the Organisation, Process, or Function

Obtain Data Prior to Fieldwork


Module 4: Conducting Internal Audit and Handling the Interview Process

Identify Risks

Plan and Audit Activities

Validate the Facts and Complete the Work

Develop a Deliverable or Report that will Drive Action

Follow Up


Module 5: Understanding Risk Management in an Internal Audit

Introduction

Risk Management Process


Module 6: Preparation of an ISO 27005 Audit

Define Audit Objectives and Scope

Select Audit Criteria

Establish Audit Teams

Develop Audit Plan


Module 7: Conducting an ISO 27005 Audit

Risk Management Process

Context Establishment

Risk Assessment

Risk Treatment

Risk Acceptance

Risk Communication and Consultation

Risk Monitoring and Review


Module 8: Closing an ISO 27005 Audit

Prepare Audit Report

Distribute Audit Report

Conduct Audit Follow-up


Module 9: Managing an ISO 27005 Audit Program

Know What and When to Audit

Create an Audit Schedule

Pre-Planning the Scheduled Audit

Conducting the Audit

Record the Findings

Report Findings


Module 10: Key Concepts, Terminology, and Definitions Lead Implementer

Internal Context

Risk


Module 11: Introduction to Risk Management

Monitoring and Reviewing Potential Risks

Risk Management Methodologies

Information Security Risk Management Framework and Process Model

Information Assets Classification, Identification, and Threats

Threat Vulnerabilities

Controls

Controlling Vulnerabilities

Vulnerability Categories and Sources

Consequences of Vulnerabilities

Incident Scenarios

Types of Vulnerabilities

Methods for Risk Assessment

Scales and Simple Calculations

Acceptance Strategies

Improvement of Risk Assessment and Risk Management

Risk Assessment and Risk Management

Implementation of Risk Management Programmes

Risk Communication and Consultation

Communicating Risk

Principles of Risk Communication

Accurate Communication

Risk Communication Procedures


Module 12: Risk Identification and Analysis

Risk Analysis and Scoring

Risk Identification

Risk Estimation

Methodologies

Components

Risk Assessment Techniques

Assumptions Analysis

Checklist Analysis

SWOT Analysis

Prompt Lists

Interviewing and Brainstorming


Module 13: Role and Responsibilities of a Risk Manager

Risk Acceptance and Making Changes

Information Security

Types of Risks and Associated Threats

Security Controls and Measures

Scope and Boundaries of Process

Constraints that Affect an Organisation

Impact of Risks

Information Security Risk Management

Train and Make Employees Aware of Risks


Module 14: Identifying, Evaluating, and Treating Risk Specified in ISO 27005

Risk Treatment

Mitigating Control Measures

Risk Analysis Tools and Evaluation

 

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click