ISO/IEC 27005 Lead Risk Manager Training Course
The ISO/IEC 27005 Lead Risk Manager training equips you with the essential expertise to support an organization in managing risks related to all assets significant for Information Security. This training uses the ISO/IEC 27005 standard as a reference framework. Throughout this course, you will gain a thorough understanding of a process model for designing and developing an Information Security Risk Management program. Additionally, the training provides in-depth knowledge of best practices in risk assessment methods such as OCTAVE, EBIOS, MEHARI, and harmonized TRA. This course also supports the implementation of the ISMS framework outlined in the ISO/IEC 27001 standard.
Once you have mastered the key concepts of Information Security Risk Management based on ISO/IEC 27005, you can take the exam to apply for the “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. Holding a PECB Lead Risk Manager Certificate demonstrates your practical knowledge and professional capabilities to lead and support a team in managing Information Security Risks.
Who should attend?
- Information Security risk managers
- Members of the Information Security team
- Individuals responsible for Information Security, compliance, and risk within an organization
- Those implementing ISO/IEC 27001 or seeking to comply with ISO/IEC 27001, or those involved in a risk management program
- IT consultants
- IT professionals
- Information Security officers
- Privacy officers
Examination - Duration: 3 hours
The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully complies with the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
- Domain 1: Fundamental principles and concepts of Information Security Risk Management
- Domain 2: Implementation of an Information Security Risk Management program
- Domain 3: Information security risk assessment
- Domain 4: Information security risk treatment
- Domain 5: Information security risk communication, monitoring, and improvement
- Domain 6: Information security risk assessment methodologies
General Information
- Certification fees are included in the exam price
- A comprehensive training material with over 350 pages of information and practical examples will be provided
- A participation certificate worth 21 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months at no additional cost
Course Outline
Day 1 Introduction to ISO 27005, concepts and implementation of a risk management program
- Section 01: Course objectives and structure
- Section 02: Standard and regulatory framework
- Section 03: Concepts and definitions of risk
- Section 04: Implementing a risk management programme
- Section 05: Context establishment
Day 2 Risk identification, evaluation, and treatment as specified in ISO 27005
- Section 06: Risk Identification
- Section 07: Risk Analysis
- Section 08: Risk Evaluation
- Section 09: Risk Assessment with a quantitative method
- Section 10: Risk Treatment
Day 3 Information Security Risk Acceptance, Communication, Consultation, Monitoring and Review
- Section 11: Information security risk acceptance
- Section 12: Information security risk communication and consultation
- Section 13: Information security risk monitoring and review
Day 4 Risk Assessment Methodologies
- Section 14: OCTAVE Method
- Section 15: MEHARI Method
- Section 16: EBIOS Method
- Section 17: Harmonized Threat and Risk Assessment (TRA) Method
- Section 18: Applying for certification and closing the training
Day 5 Certification Exam
Requirements
A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.
Open Training Courses require 5+ participants.
ISO/IEC 27005 Lead Risk Manager Training Course - Booking
ISO/IEC 27005 Lead Risk Manager Training Course - Enquiry
ISO/IEC 27005 Lead Risk Manager - Consultancy Enquiry
Testimonials (3)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
Upcoming Courses
Related Courses
AML OFFICER MASTERCLASS
21 HoursThere is an international focus on combating money laundering. Compliance officers, AML Officers, MLROs, KYC analysts, auditors, and managers need to understand how to ensure adherence to Subsidiary 373.01, the Prevention of Money Laundering and Funding of Terrorism Regulations (PMLFTR).
Under the PMLFTR, all subject persons, including those in the regulated financial services sector, are required to appoint a Money Laundering Reporting Officer (MLRO).
This practical course provides you with the knowledge and essential guidance needed to approach AML compliance within your organization, with particular emphasis on the regulatory environment in Malta.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III is a global regulatory standard for bank capital adequacy, stress testing, and market liquidity risk. Initially agreed upon by the Basel Committee on Banking Supervision in 2010–2011, the implementation of The Accord has been extended to March 31, 2019. Basel III enhances bank capital requirements by increasing liquidity and reducing leverage.
Unlike Basel I and II, Basel III requires different levels of reserves for various forms of deposits and other types of borrowings. It complements rather than replaces the earlier accords.
Navigating this complex and evolving landscape can be challenging. Our course and training will help you manage these changes and their impact on your institution effectively. We are accredited by and a training partner of the Basel Certification Institute, ensuring that our training and materials are up-to-date and effective.
Objectives:
- To prepare for the Certified Basel Professional Examination.
- To develop practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within a banking organization.
Target Audience:
- Board members with risk responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- An introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations for market, credit, counterparty, and liquidity risk
- Stress testing methodologies, including how to formulate and deliver stress tests
- The potential impact of Basel III on the international banking industry, with practical demonstrations of its application
- The need for new Basel norms
- An overview of the Basel III norms
- The objectives of the Basel III norms
- The timeline for Basel III implementation
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This four-day event (CGEIT training) offers comprehensive preparation for the exam, ensuring that you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognized symbol of excellence in IT governance, awarded by ISACA. It is tailored for professionals responsible for managing IT governance or those with significant advisory or assurance responsibilities in this area.
Achieving CGEIT status will enhance your recognition in the industry and increase your influence at the executive level.
Objectives:
This seminar has been designed to prepare participants for the CGEIT examination by enhancing their existing knowledge and understanding, ensuring they are well-prepared to pass the exam as defined by ISACA.
Target Audience:
Our training course is aimed at IT and business professionals with significant experience in IT governance who are preparing to take the CGEIT exam.
COBIT 2019 Foundation
21 HoursLearning Objectives
This COBIT 2019 Foundation course serves as an introduction to COBIT 2019 and aims to help you understand how an integrated business framework for the governance and management of enterprise IT can be leveraged to achieve seamless IT-business integration, cost reductions, and increased productivity. The key areas covered in this course include:
- Introduction to the new framework
- Key concepts and terminology
- Governance and Framework Principles
- Components of the governance system
- Governance and management objectives
- Performance management
- Designing a customized governance system
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
- Understand the rules set forth by government regulators for payment service providers.
- Create the internal policies and procedures needed to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensures that all corporate processes and procedures comply with the compliance program.
- Uphold the business's reputation while protecting it from lawsuits.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course provides an expert introduction to the newly enacted Accessibility Law and equips developers with the practical skills to design, develop, and maintain fully accessible applications. Starting with a contextual discussion on the law's importance and implications, the course quickly shifts to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Goal:
To ensure that participants gain a fundamental understanding of GRC processes and capabilities, as well as the skills needed to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
- Basic terms and definitions in GRC
- Principles governing GRC
- Core components, practices, and activities of GRC
- The relationship between GRC and other disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO/IEC 27001 Foundation
14 HoursWhy should you attend?
The ISO/IEC 27001 Foundation training provides a comprehensive introduction to implementing and managing an Information Security Management System (ISMS) as outlined in ISO/IEC 27001. Throughout this course, you will gain a deep understanding of the various components of an ISMS, such as policies, procedures, performance metrics, management commitment, internal audits, management reviews, and continuous improvement.
Upon completing the course, you will be eligible to take the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” certification. This credential demonstrates that you have a solid grasp of the essential methodologies, requirements, framework, and management approaches specified in the standard.
Who should attend?
- Professionals involved in Information Security Management
- Individuals aiming to acquire knowledge about the core processes of Information Security Management Systems (ISMS)
- Those interested in pursuing a career in Information Security Management
Educational approach
- Lecture sessions are enriched with practical questions and real-world examples
- Practical exercises include case studies and group discussions
- Practice tests mirror the format of the Certification Exam
PECB ISO/IEC 27001 Lead Auditor
35 HoursISO/IEC 27001 Lead Auditor
The ISO/IEC 27001 Lead Auditor training equips you with the essential expertise to conduct an Information Security Management System (ISMS) audit, leveraging widely recognized auditing principles, procedures, and techniques.
Why should you attend?
Throughout this course, you will gain the knowledge and skills needed to plan and execute both internal and external audits in accordance with ISO 19011 and the ISO/IEC 17021-1 certification process.
Through practical exercises, you will become proficient in audit techniques and develop the competence to manage an audit program, lead an audit team, communicate effectively with clients, and resolve conflicts.
After acquiring the necessary expertise to perform these audits, you can take the exam and apply for the “PECB Certified ISO/IEC 27001 Lead Auditor” credential. Holding a PECB Lead Auditor Certificate will demonstrate your capability and competence to audit organizations based on best practices.
Who should attend?
- Auditors aiming to perform and lead Information Security Management System (ISMS) certification audits
- Managers or consultants seeking to master the ISMS audit process
- Individuals responsible for maintaining compliance with ISMS requirements
- Technical experts preparing for an ISMS audit
- Expert advisors in Information Security Management
Learning objectives
- Understand the operations of an Information Security Management System based on ISO/IEC 27001
- Recognize the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Grasp an auditor’s role in planning, leading, and following up on a management system audit according to ISO 19011
- Learn how to lead an audit and manage an audit team
- Understand how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
- Acquire the competencies of an auditor to plan, lead, draft reports, and follow up on audits in compliance with ISO 19011
Educational approach
- The training combines theoretical knowledge with best practices used in ISMS audits
- Lecture sessions are enriched with examples based on case studies
- Practical exercises include role-playing and discussions based on a case study
- Practice tests mirror the Certification Exam format
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training equips you with the essential expertise and knowledge needed to support an organization in implementing and managing Information Security controls as outlined in ISO/IEC 27002.
Upon completing this course, you will be eligible to take the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” certification. This certification demonstrates that you have a deep understanding of the principles and techniques required for implementing and managing Information Security Controls based on ISO/IEC 27002.
Who should attend?
- Managers or consultants aiming to implement an Information Security Management System (ISMS) in line with ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants looking to master the process of implementing an Information Security Management System
- Individuals responsible for information security, compliance, risk management, and governance within their organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- Chief Technology Officers (CTOs), Chief Information Officers (CIOs), and Chief Information Security Officers (CISOs)
Learning objectives
- Gain expertise in implementing Information Security controls by following the framework and principles of ISO/IEC 27002
- Develop a thorough understanding of the concepts, approaches, standards, methods, and techniques necessary for effectively implementing and managing Information Security controls
- Comprehend the interrelationships between various components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the significance of information security in organizational strategy
- Master the implementation of information security management processes
- Acquire skills in formulating and implementing security requirements and objectives
Educational approach
- This training combines theoretical knowledge with practical application
- Lectures are supplemented with real-world examples to illustrate key concepts
- Practical exercises based on case studies are included to enhance learning
- Review exercises are provided to help prepare for the exam
- A practice test similar to the certification exam is conducted
General Information
- Certification fees are included in the exam price
- Participants will receive training materials containing over 500 pages of information and practical examples
- A participation certificate with 31 CPD (Continuing Professional Development) credits will be issued to participants
- In case of exam failure, you have the option to retake the exam within 12 months at no additional cost
ISO 9001 and ISO 27001 – Interpretation and Internal Auditor
21 HoursISO 9001 and ISO 27001 are internationally recognized standards for quality management systems and information security management systems, respectively.
This instructor-led, live training (available online or onsite) is designed for intermediate-level professionals who aim to interpret the ISO 9001 and ISO 27001 standards effectively and conduct internal audits with precision.
By the end of this training, participants will be able to:
- Grasp the principles and requirements outlined in ISO 9001 and ISO 27001.
- Apply the clauses and controls in practical scenarios.
- Plan and execute internal audits that comply with ISO standards.
- Identify areas of nonconformity and suggest appropriate corrective measures.
Format of the Course
- Interactive lectures and discussions.
- Simulated auditing exercises and case studies.
- Practical analysis of quality and security situations.
Course Customization Options
- To request a tailored training program for this course, please contact us to arrange.
ISO/IEC 27001 Lead Auditor (certification course)
35 HoursWho can attend?
- Auditors looking to perform and lead information security management system (ISMS) audits
- Managers or consultants aiming to master the ISMS audit process
- Individuals responsible for maintaining compliance with ISMS requirements within an organization
- Technical experts preparing for ISMS audits
- Expert advisors in information security management
Learning objectives
By the end of this training course, participants will be able to:
- Explain the core concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
- Interpret the ISO/IEC 27001 requirements for an ISMS from an auditor's perspective
- Evaluate whether the ISMS conforms to ISO/IEC 27001 requirements, in line with fundamental audit principles and concepts
- Plan, conduct, and conclude an ISO/IEC 27001 compliance audit, adhering to ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best auditing practices
- Manage an ISO/IEC 27001 audit program effectively
Educational approach
- The training combines theoretical knowledge with practical approaches used in ISMS audits
- Lectures are enriched with examples based on real-world case studies
- Practical exercises involve a case study, including role-playing and discussions
- Practice tests mirror the format of the Certification Exam