Pour les demandes entreprises : (+212) 703173603

Pour les demandes particuliers : (+212) 702062126

A propos de la formation ISO 27005 Training

The ISO 27005 Lead Auditor Training is a comprehensive course that focuses on the principles and practices of Information Security Risk Management, aligned with ISO 27005 standards. This training equips participants with the necessary skills and knowledge to conduct audits of Information Security Risk Management Systems (ISRM). It emphasizes the significance of protecting sensitive information and ensuring the integrity, confidentiality, and availability of data within organizations.

Détails
Objectifs pédagogiques de la formation ISO 27005 Training
  • Provide a detailed understanding of ISO 27005 standards
  • Equip participants with the knowledge to lead Information Security Risk Management audits
  • Guide professionals in conducting assessments and audits according to ISO 27005
  • Enhance participants' skills in assessing risk management processes
  • Prepare individuals for the lead auditor role in information security risk management
  • Ensure participants are well-versed in audit methodologies and compliance with ISO 27005 standards.

Qui devrait suivre cette formation ISO 27005 Training ?

Public visé par la formation ISO 27005 Training

This training is designed for professionals involved in Information Security and Risk Management. The target audience includes Information Security Managers, Risk Managers, Compliance Officers, Internal Auditors, Business Continuity Professionals, Security Analysts, and individuals responsible for conducting audits and assessments within their organizations.

Prérequis de la formation ISO 27005 Training

There are no formal prerequisites for this ISO 27005 Lead Auditor Course. However, participants with a background or familiarity in Information Security and Risk Management will benefit the most from the training.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • Cobit 5 Détails
  • CISSP – Certified Information Systems Security Professional Détails
  • TOGAF® 9.2 Foundation Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 14000 Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27000 Détails
  • ISO 27005 Risk Manager Détails
  • IS0 27002 Détails
  • IT Management – COBIT Détails
  • IT Management – COBIT. Détails
  • SOC Analyst (Blue Team) Détails
  • Zero Trust Security Framework Détails
  • Sustainability & Green IT pour Collectivités Détails
  • Cyber-resilience des Services Publics Détails
  • Cybersecurity & Cloud Security for Enterprises Détails
  • Pentesting Web Apps & Mobile Apps Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • Smart Cities & Gouvernance Digitale Détails
  • Data for Public Policy & Urban Analytics Détails
  • TOGAF – Enterprise Architecture Framework Détails
  • ISO 19011 Internal Auditor & ISO 27001 (LA) Détails
  • CISM – Certified Information Security Manager Détails
  • SSCP – Systems Security Certified Practitioner Détails
  • DPS-CISA et CISSP Détails
  • Computer Security (SSO Session) Détails
  • ITIL Détails
  • ITIL4 Strategic Leader Certification – Module 1 & 2 Détails
  • IEC 62443 Certification Détails
  • ISO/IEC 27001 – Système de Management de la Sécurité de l’Information Détails
  • ISO 22000 – Système de Management de la Sécurité des Denrées Alimentaires Détails
  • Citrix Certified Advanced Administrator (CCAA) Détails
  • Palo Alto Networks PCCET (Certified Cybersecurity Entry-level Technician) Détails
  • Palo Alto Networks PCNSE (Certified Network Security Engineer) Détails
  • Analyste Cybersécurité Détails
  • ISO/IEC 27001:2022 Détails
  • Veeam Data Platform v12 – Backup, Réplication & Protection des Données Détails
  • Formation ISO/IEC 27001:2022 – Implementation Détails

Déroulé de la formation ISO 27005 Training


Module 1: Introduction to ISO 27005 Standard

Introduction

Concepts, Key Definitions, and Background

Quality Management System (QMS)

Information Security Risk Management

Role and Importance

Understanding the Situation in an Organisation

Reviewing and Monitoring

Octave Method

EBIOS Method

MEHARI

Harmonised TRA Method


Module 2: Interaction with Other ISO

How ISO 27005 Interacts with ISO 27001?

Quantifying the Business Impact

Impact Severity


Module 3: Planning Individual Internal Audits

Internal Audit Approach

Risk Assurance Mapping

Audit Plan

Research the Audit Area

Conduct Process Walk-Throughs

Map Risks to the Organisation, Process, or Function

Obtain Data Prior to Fieldwork


Module 4: Conducting Internal Audit and Handling the Interview Process

Identify Risks

Plan and Audit Activities

Validate the Facts and Complete the Work

Develop a Deliverable or Report that will Drive Action

Follow Up


Module 5: Understanding Risk Management in an Internal Audit

Introduction

Risk Management Process


Module 6: Preparation of an ISO 27005 Audit

Define Audit Objectives and Scope

Select Audit Criteria

Establish Audit Teams

Develop Audit Plan


Module 7: Conducting an ISO 27005 Audit

Risk Management Process

Context Establishment

Risk Assessment

Risk Treatment

Risk Acceptance

Risk Communication and Consultation

Risk Monitoring and Review


Module 8: Closing an ISO 27005 Audit

Prepare Audit Report

Distribute Audit Report

Conduct Audit Follow-up


Module 9: Managing an ISO 27005 Audit Program

Know What and When to Audit

Create an Audit Schedule

Pre-Planning the Scheduled Audit

Conducting the Audit

Record the Findings

Report Findings


Module 10: Key Concepts, Terminology, and Definitions Lead Implementer

Internal Context

Risk


Module 11: Introduction to Risk Management

Monitoring and Reviewing Potential Risks

Risk Management Methodologies

Information Security Risk Management Framework and Process Model

Information Assets Classification, Identification, and Threats

Threat Vulnerabilities

Controls

Controlling Vulnerabilities

Vulnerability Categories and Sources

Consequences of Vulnerabilities

Incident Scenarios

Types of Vulnerabilities

Methods for Risk Assessment

Scales and Simple Calculations

Acceptance Strategies

Improvement of Risk Assessment and Risk Management

Risk Assessment and Risk Management

Implementation of Risk Management Programmes

Risk Communication and Consultation

Communicating Risk

Principles of Risk Communication

Accurate Communication

Risk Communication Procedures


Module 12: Risk Identification and Analysis

Risk Analysis and Scoring

Risk Identification

Risk Estimation

Methodologies

Components

Risk Assessment Techniques

Assumptions Analysis

Checklist Analysis

SWOT Analysis

Prompt Lists

Interviewing and Brainstorming


Module 13: Role and Responsibilities of a Risk Manager

Risk Acceptance and Making Changes

Information Security

Types of Risks and Associated Threats

Security Controls and Measures

Scope and Boundaries of Process

Constraints that Affect an Organisation

Impact of Risks

Information Security Risk Management

Train and Make Employees Aware of Risks


Module 14: Identifying, Evaluating, and Treating Risk Specified in ISO 27005

Risk Treatment

Mitigating Control Measures

Risk Analysis Tools and Evaluation

 

Formations Similaires
CISA – Certified Information Systems Auditor Détails
Cobit 5 Détails
CISSP – Certified Information Systems Security Professional Détails
TOGAF® 9.2 Foundation Détails
ISO 45001 Lead Auditor Détails
ISO 14000 Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Détails
ISO 45001 Lead Implementer Détails
ISO 27000 Détails
ISO 27005 Risk Manager Détails
IS0 27002 Détails
IT Management – COBIT Détails
IT Management – COBIT. Détails
SOC Analyst (Blue Team) Détails
Zero Trust Security Framework Détails
Sustainability & Green IT pour Collectivités Détails
Cyber-resilience des Services Publics Détails
Cybersecurity & Cloud Security for Enterprises Détails
Pentesting Web Apps & Mobile Apps Détails
Offensive Security Certified Professional (OSCP) Détails
Smart Cities & Gouvernance Digitale Détails
Data for Public Policy & Urban Analytics Détails
TOGAF – Enterprise Architecture Framework Détails
ISO 19011 Internal Auditor & ISO 27001 (LA) Détails
CISM – Certified Information Security Manager Détails
SSCP – Systems Security Certified Practitioner Détails
DPS-CISA et CISSP Détails
Computer Security (SSO Session) Détails
ITIL Détails
ITIL4 Strategic Leader Certification – Module 1 & 2 Détails
IEC 62443 Certification Détails
ISO/IEC 27001 – Système de Management de la Sécurité de l’Information Détails
ISO 22000 – Système de Management de la Sécurité des Denrées Alimentaires Détails
Citrix Certified Advanced Administrator (CCAA) Détails
Palo Alto Networks PCCET (Certified Cybersecurity Entry-level Technician) Détails
Palo Alto Networks PCNSE (Certified Network Security Engineer) Détails
Analyste Cybersécurité Détails
ISO/IEC 27001:2022 Détails
Veeam Data Platform v12 – Backup, Réplication & Protection des Données Détails
Formation ISO/IEC 27001:2022 – Implementation Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click