GRC Academy has been acquired by Summit 7!

Learn more

PECB ISO/IEC 27005:2022 Risk Manager

Learn how to manage information security risk!

SARĀ 2,250.17 SARĀ 4,106.91
8 hour 29 minute
Exam & certification included

What you'll learn

Learn how to establish a risk management framework to manage information security risk
Learn how to embed information security risk management in daily and strategic operations
Learn fundamental information security risk management concepts, approaches, methods, and techniques
Learn how to interpret the requirements of ISO 27005 in the specific context of an organization

Description

PECB ISO/IEC 27005:2022 Risk Manager

Was SARĀ 4,106.91 Now SARĀ 2,250.17
Sale

Learn how to manage information security risk!

The PECB ISO/IEC 27005:2022 Risk Manager training course teaches you how to integrate information security risk management guidelines into an organization.

What Is ISO 27005?

ISO/IEC 27005 provides a risk management framework to manage information security risks. The standard provides guidelines on identifying, analyzing, evaluating, communicating, treating, and monitoring information security risks.

The standard supports the guidelines of ISO 31000 and is particularly helpful for organizations aiming to safeguard their information assets and achieve information security objectives.

The following PECB references are available:

Why Should You Attend?

The PECB ISO/IEC 27005 Risk Manager certification demonstrates that you comprehend the concepts and principles of information security risk management as outlined by ISO/IEC 27005 and also ISO 31000.

This online course will enable you to structure an information security risk management framework and effectively integrate it into the organization. It will help you create a structured approach regarding the identification, analysis, treatment, assessment, and evaluation of risks that are or can be faced by an organization. It also provides an overview of other risk assessment methods, such as OCTAVE, MEHARI, EBIOS, NIST, CRAMM, and Harmonized TRA.

The training course is followed by a certification exam. After successfully passing the exam, you may apply for a ā€œPECB Certified ISO/IEC 27005 Risk Managerā€ certification which is UKAS accredited and internationally recognized. The certification validates your competence to implement a risk management framework in an organization based on the guidelines of ISO/IEC 27005 and industry best practices

Educational approach

  • The training course is based on the theory and the best practices of information security.
  • Lecture sessions are illustrated with practical examples and scenarios
  • Participants are encouraged to communicate and engage in discussions and exercises
  • The quizzes are similar in structure with the certification exam questions

Prerequisites

A fundamental understanding of risk management, processes, and principles.

Examination

The ā€œPECB Certified ISO/IEC 27005 Risk Managerā€ exam complies with the requirements of the PECB Examination and Certification Program (ECP) and covers the following competency domains:

  • Domain 1: Fundamental principles and concepts of information security risk management
  • Domain 2: Implementation of an information security risk management program
  • Domain 3: Information security risk management framework and processes based on ISO/IEC 27005
  • Domain 4: Other information security risk assessment methods

For specific information about exam type, languages available, and other details, please visit the List of PECB Exams and the Examination Rules and Policies.

Certification

After successfully completing the exam, you can apply for the credentials shown on the table below:

CredentialExamProfessional experienceInformation Security Risk Management experienceOther requirements
PECB Ceritified ISO/IEC 27005 Provisional Risk ManagerPECB Certified ISO/IEC 27005 Risk Manager exam or equivalentNoneNoneSigning the PECB Code of Ethics
PECB Certified ISO/IEC 27005 Risk ManagerPECB Certified ISO/IEC 27005 Risk Manager exam or equivalentTwo years: One year of work experience in ISRMInformation Security Risk Management activities: a total of 200 hoursSigning the PECB Code of Ethics

You will receive a certificate once you comply with all the requirements related to the selected credential.

To be considered valid risk management experience, the candidate’s activities should follow best practices and include the following:

  1. Defining a risk management approach
  2. Determining the risk management objectives and scope
  3. Conducting a risk assessment
  4. Developing a risk management program
  5. Defining risk evaluation and risk acceptance criteria
  6. Evaluating risk treatment options
  7. Monitoring and reviewing the risk management program 

General Information

  • Certification and examination fees are included in the price of the training course
  • Training course materials containing over 350 pages of information and practical examples will be distributed to participants
  • An attestation of course completion of 21 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course
  • If you fail the exam, you can retake the exam once for free within 12 months following the initial exam date

Fulfillment

Orders will be fulfilled within 24 hours assuming the student possesses a valid PECB ID number. Register a PECB account to obtain a PECB ID number.

Audience

Top management responsible for integrating information security risk management into the organization's processes
Project managers or consultants responsible for information security risk management
Individuals seeking to gain knowledge about information security risk management frameworks and processes
Professionals responsible for ensuring conformity with the requirements of ISO 27005 in an organization

Curriculum

33 lesson • 8 hour 29 minute
Section 1: Training course objectives and structure
Training course objectives and structure
13 minute
Section 2: Standards and regulatory frameworks
Standards and regulatory frameworks - part 1
15 minute
Standards and regulatory frameworks - part 2
13 minute
Section 2 Quiz
Section 3: Fundamental concepts and principles of information security risk management
Fundamental concepts and principles of information security risk management - part 1
15 minute
Fundamental concepts and principles of information security risk management - part 2
16 minute
Section 3 Quiz
Section 4: Information security risk management program
Information security risk management program - part 1
18 minute
Information security risk management program - part 2
9 minute
Information security risk management program - part 3
14 minute
Section 4 Quiz
Section 5: Context establishment
Context establishment - part 1
16 minute
Context establishment - part 2
17 minute
Context establishment - part 3
13 minute
Context establishment - part 4
16 minute
Section 5 Quiz
Scenario-based quiz 1: Sections 2-5
Scenario-based quiz 1: Sections 2-5
Section 6: Risk identification
Risk identification - part 1
17 minute
Risk identification - part 2
13 minute
Risk identification - part 3
12 minute
Section 6 Quiz
Section 7: Risk analysis
Risk analysis
18 minute
Section 7 Quiz
Section 8: Risk evaluation
Risk evaluation
16 minute
Section 8 Quiz
Section 9: Risk treatment
Risk treatment - part 1
16 minute
Risk treatment - part 2
16 minute
Section 9 Quiz
Section 10: Information security risk communication and consultation
Information security risk communication and consultation - part 1
15 minute
Information security risk communication and consultation - part 2
17 minute
Section 10 Quiz
Scenario-based quiz 2: Sections 6-10
Scenario-based quiz 2: Sections 6-10
Section 11: Information security risk recording and reporting
Information security risk recording and reporting - part 1
14 minute
Information security risk recording and reporting - part 2
12 minute
Section 11 Quiz
Section 12: Information security risk monitoring and review
Information security risk monitoring and review - part 1
18 minute
Information security risk monitoring and review - part 2
17 minute
Section 12 Quiz
Section 13: OCTAVE and MEHARI methodologies
OCTAVE and MEHARI methodologies - part 1
15 minute
OCTAVE and MEHARI methodologies - part 2
19 minute
Section 13 Quiz
Section 14: EBIOS method and NIST framework
EBIOS method and NIST framework - part 1
15 minute
EBIOS method and NIST framework - part 2
14 minute
Section 14 Quiz
Section 15: CRAMM and TRA methods
CRAMM and TRA methods - part 1
10 minute
CRAMM and TRA methods - part 2
10 minute
Section 15 Quiz
Section 16: Closing of the training course
Closing of the training course - part 1
17 minute
Closing of the training course - part 2
15 minute
Scenario-based quiz 3: Sections 11-16
Scenario-based quiz 3: Sections 11-16
0

Subtotal