Mô tả

Welcome to this  course on Information Security Risk Management and guidelines of the internationally recognized standard ISO/IEC 27005:2022. In today's interconnected world, safeguarding sensitive information is more critical than ever. Join me to equip yourself with the knowledge and tools to tackle the ever-evolving landscape of information security threats.

The course covers the ISO/IEC 27005:2022 guidelines for managing information security risks, applicable to all types of organizations, regardless of size or sector. We'll explore the fundamental principles of risk management and its practical application in information security. This internationally recognized standard will help establish a robust risk management framework within your organization.

The course is structured into five sections. In the first section, we'll discuss about information security management, the ISO/IEC 27000 series of international standards and I will introduce you to ISO/IEC 27005:2022.

The second section of the course covers context establishment, including the risk appetite of an organization or how to establish criteria for risk acceptance. We'll also discuss the differences between the qualitative and quantitative approaches to defining consequences and likelihood as constitutive elements of risk.

Then, in the third section, we'll explore risk assessment including risk identification, using the approaches proposed by ISO/IEC 27005:2022, the event-based approach and the asset-based approach. Detailed insights into risk analysis, risk evaluation (as steps of the risk assessment) and the role of risk owners are discussed in this section as well.

In section four of the course we will cover risk treatment and the most common options to address information security risks for an organization. We'll discuss about the information security controls from ISO/IEC 27001:2022 and I will tell you about some key documents of an ISMS (Information Security Management System) like the Statement of Applicability (SoA) or the risk treatment plan.

The last section is dedicated to continual improvement in the risk management process, as well as insights on the certification for organizations and for persons in the context of information security.

By the end of this course, you'll possess a solid understanding of the information security risk management process, including threat and vulnerability analysis, risk level calculation or effective risk treatment strategies. Empowered with this knowledge, you can implement a successful risk management program, ensuring the confidentiality, integrity and availability of sensitive data within your organization.

Don't miss this opportunity to boost your expertise in information security risk management and ISO/IEC 27005:2022. Enroll now and upgrade your knowledge and skills to help your company protect its valuable information assets.

Bạn sẽ học được gì

What is an information security risk and what is an ISMS

What represents the risk appetite of an organization

How to establish risk acceptance criteria

How to identify information security risks

The relationship between threats and vulnerabilities

How to estimate likelihood and consequence as constitutive elements of risk

How to calculate a risk level

What are the requirements for risk owners and why risks should be owned

Which are the options available for risk treatment

Key documents for an ISMS like the SoA or the risk treatment plan

Yêu cầu

  • Familiarity with the ISO standards on information security management is useful but not mandatory

Nội dung khoá học

5 sections

Introductive section

5 lectures
Introduction
04:04
Information security management
05:58
The ISO/IEC 27000 series of standards
07:30
About ISO/IEC 27005
04:48
Information security risk management
05:34

Context establishment

5 lectures
Context establishment
05:56
Risk acceptance criteria
07:04
Criteria for performing information security risk assessments
04:50
Qualitative vs. quantitative approaches part 1
04:19
Qualitative vs. quantitative approach part 2
05:20

Information security risk assessment

6 lectures
Generic requirements for the information security risk assessment
02:59
The event-based approach to risk identification
04:30
The asset-based approach to risk identification
05:12
Identifying risk owners
03:47
Analyzing information security risks
08:14
Evaluating information security risks
05:41

Information security risk treatment

5 lectures
Risk treatment options
07:47
Determining the necessary controls
05:32
Preventive, detective and corrective controls
03:54
The Statement of Applicability (SoA)
05:58
The risk treatment plan
06:16

Considerations about the information security risk management process

4 lectures
More considerations about the information security risk management process
08:05
Continual improvement
06:08
Certification for information security management
04:30
Thank you and good bye!
05:04

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.