Information Security Risk Management (ISO 27005)
Learn how to manage information security risks, the professional way
IT & Software,Network & Security,Risk Management
Lectures -11
Duration -1 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Given how quickly technology is evolving today's businesses, information risk management is crucial. Organizations of all sizes, small and large, need to be aware that the present cyber dangers might turn them into a valuable target for attackers. An attack might happen to even the largest business with a sizable consumer base. A cyberattack on an unprepared company could result in data loss, financial impact, harm to the brand's reputation, and employee morale loss. Installing antivirus software alone is no longer sufficient to stop attacks. One facet of risk management is antivirus.
Organizations must create and implement a risk management strategy to reduce the risks that are unique to their industry and get rid of the possibility of cyberattacks.
By the end of the course, there is a project. There is a provided template used to assess cyber security risks. You need to use this template to create at least 5 cyber security risks related to your organization. Assess the potentiality and impact of these risks, then calculate the score using a risk matrix. You then have to score the residual risks after creating a risk treatment plan.
The matrix of risks is found in the file, the file also have pre-populated set of risks that you can use as a reference to create your organization specific risks.
Who this course is for:
- ISO 27005 is applicable to all organizations, regardless of size or sector
- The course supports the general concepts specified in ISO 27001
- The course and is designed to assist the satisfactory implementation of information security based on a risk management approach
Goals
What will you learn in this course:
Define risk management best practices tailored for information security
Learn how to conform to the standards of an Information Security Management System (ISMS), as required by ISO/IEC 27001
Identify and assess cyber security risk
Understand risk likelihood and the consequences for the business
Establish a priority order for risk treatment
Create an effective risk treatment and monitoring plan
Prerequisites
What are the prerequisites for this course?
No prior experience in risk management is required
The course starts with essential concepts of cyber risk management
Curriculum
Check out the detailed breakdown of what’s inside the course
Information Security Risk Management (ISO 27005)
11 Lectures
- Risk Concept 07:05 07:05
- Risk Definitions 01:17 01:17
- Cyber Risk Management 06:29 06:29
- Risk Management Implementation Requirements 22:16 22:16
- Risk Identification 03:36 03:36
- Threats and Vulnerabilities 08:41 08:41
- Risk Analysis 09:04 09:04
- Risk Assessment Approaches 07:43 07:43
- Risk Treatment and Residual Risks 04:49 04:49
- Risk Acceptance 01:09 01:09
- Risk Metrics and Project 01:03 01:03
Instructor Details
Mohamad Mahjoub
Cyber Security ExpertHi! I’m Mohamad; you might call me a bit of a computer geek; just a bit.
After spending 5 years working as an IT Project Manager for a leading multinational pharmaceutical company, I moved to the Banking sector to attain a senior role in the Information Security Audit field for 4 years; it was such a great experience. I have then relocated to Dubai to join a Dubai Smart Government entity for 3 years as an Information Security Manager. Currently I’m working as an Information Security Consultant for different companies in Dubai, Oman, and Bahrain. I have a total of 15 years of experience in the Information Technology field, with a focus on Information Security.
Since 2012, I have delivered many IT courses and topics to technical and non-technical audience, varying from fresh graduates, IT professionals, senior and executive management, and business owners. In a world of ubiquitous technology, I believe that Information Security is more important than ever, and it is something that everyone should be aware of, therefore it should not only be exclusive to the privileged few. I’m passionate about making this happen through spreading my knowledge to people like you. I’m a certified CISSP, CISA, PMP, ITIL, and ISO 27005 Risk Manager and I have a Masters in Computer Science from the Lebanese American University (LAU).
I hope you will enjoy my course.
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now