Companies Home Search Profile

ISO 27005:2022 Manage Information Security Risk Step by Step

Focused View

Dr. Amar Massoud

4:27:06

18 View
  • 001 Introduction.mp4
    05:59
  • 002 Our Use Case - HealthSecure Inc.mp4
    03:28
  • 001 Information Security Risk Management Process.mp4
    06:42
  • 002 Organizational Considerations.mp4
    05:50
  • 003 Identifying Basic Requirements of Interested Parties.mp4
    07:07
  • 004 Criteria for Performing Information Security Risk Assessments.mp4
    13:21
  • 005 Qualitative vs Quantitative Approach.mp4
    02:52
  • 001 Qualitative Risk Assessment Approach.mp4
    02:52
  • 002 Consequence Criteria.mp4
    06:37
  • 003 Qualitative Consequence Scale.mp4
    05:41
  • 004 Likelihood Criteria.mp4
    03:01
  • 005 Qualitative Likelihood Scale.mp4
    05:17
  • 006 Criteria for Determining the Level of Risk.mp4
    02:41
  • 007 Qualitative Level of Risks.mp4
    05:30
  • 001 Quantitative Approach.mp4
    05:04
  • 002 Quantitative Likelihood Scale.mp4
    04:47
  • 003 Quantitative Consequence Scale.mp4
    06:15
  • 004 Quantitative Level of Risks.mp4
    06:09
  • 005 Risk Acceptance Criteria.mp4
    06:20
  • 006 Quantitative Risk Acceptance Matrix.mp4
    04:41
  • 001 Choosing an Appropriate Method.mp4
    03:02
  • 002 Information Security Risk Assessment Process.mp4
    03:42
  • 003 Risk Assessment Methodologies.mp4
    08:08
  • 004 Identifying Information Security Risks.mp4
    04:45
  • 005 Asset Based Risk Identification.mp4
    04:57
  • 006 Identify Vulnerabilities and Threats.mp4
    08:54
  • 007 HealthSecure Assets Risk Identification.mp4
    02:10
  • 008 Identifying Risk Owners.mp4
    03:21
  • 009 Analysing Information Security Risks.mp4
    02:45
  • 010 Assessing Potential Consequences.mp4
    05:27
  • 011 Assessing Likelihood.mp4
    06:33
  • 012 Determining the Level of Risks.mp4
    05:26
  • 013 Prioritizing the Analyzed Risks for Risk Treatment.mp4
    03:26
  • 014 Event Based Risk Identification.mp4
    09:31
  • 015 Information Security Risk Treatment.mp4
    11:15
  • 016 Producing the Statement of Applicability.mp4
    05:43
  • 017 Information Security Risk Treatment Plan.mp4
    11:15
  • 018 Residual Risks.mp4
    05:17
  • 001 Operation.mp4
    05:16
  • 001 Leveraging Related ISMS Process.mp4
    02:54
  • 002 Leadership and Commitment.mp4
    03:57
  • 003 Communication and Consultation.mp4
    07:20
  • 004 Documented Information.mp4
    05:38
  • 005 Improvements and Review.mp4
    06:18
  • 006 Management Review.mp4
    06:12
  • 007 Corrective Actions.mp4
    04:46
  • 008 Improvement.mp4
    06:11
  • 001 Conclusion.mp4
    02:43
  • Description


    With a Use Case and Templates

    What You'll Learn?


    • Understand and apply ISO 27005:2022 methodologies for information security risk assessments.
    • Identify, analyze, and evaluate risks to information security within an organizational context.
    • Develop and implement effective risk treatment plans aligned with ISO 27005:2022 guidelines.
    • Continuously monitor and review risk management processes for ongoing improvement and compliance.

    Who is this for?


  • Information Security Professionals: Ideal for those working in or aspiring to work in information security roles, including security analysts, managers, and consultants who seek to deepen their understanding of risk assessment in line with ISO standards.
  • IT Professionals: IT staff responsible for managing and safeguarding digital assets. The course is particularly beneficial for those involved in developing or maintaining an Information Security Management System (ISMS).
  • Compliance Officers and Auditors: Professionals involved in ensuring regulatory compliance or conducting internal audits within organizations, especially in sectors with stringent data protection and privacy regulations.
  • Business Managers and Executives: Decision-makers who need to understand the risk landscape of their organizations to make informed decisions about information security strategies and investments.
  • Project Managers and Developers: Individuals responsible for overseeing IT projects, including software development, who need to incorporate risk management into their project lifecycle.
  • Students and Academics: Learners in the fields of cybersecurity, information technology, or business management who aim to gain a comprehensive understanding of risk assessment methodologies and practices.
  • What You Need to Know?


  • This course is designed to be accessible to beginners. No advanced technical knowledge is required.
  • Basic familiarity with information security concepts will be helpful but not essential.
  • The course will cover foundational elements, making it suitable for those new to risk assessment in the context of ISO standards.
  • More details


    Description

    Course Overview: Dive into the world of risk assessment in line with ISO/IEC 27005:2022 standards in our comprehensive course. This training is uniquely designed to provide a blend of theoretical knowledge and practical application, using a fictional model company, "HealthSecure Inc.," as a continuous case study throughout the course.

    What You'll Learn:

    • Fundamentals of ISO 27005:2022: Understand the core concepts, principles, and frameworks of ISO 27005:2022.

    • Risk Assessment Techniques: Learn to identify, analyze, and evaluate information security risks using proven methodologies.

    • Practical Application: Apply your learning to real-life scenarios through the HealthSecure Inc. case study, encompassing various aspects of risk assessment and treatment.

    • Use of Tools and Templates: Gain hands-on experience with risk assessment tools and templates that can be adapted to your professional context.

    Course Features:

    • Interactive Learning: Engaging content including lectures, interactive sessions, and group discussions.

    • HealthSecure Inc. Case Study: A comprehensive use case running throughout the course, providing practical insights into the application of risk assessment in a business environment.

    • Hands-On Assignments: Practical assignments and projects that simulate real-world risk assessment challenges.

    • Resource Toolkit: Access to a range of templates and tools for conducting risk assessments, allowing for immediate application in your workplace.

    • Expert Instructors: Learn from experienced professionals with extensive knowledge in information security and risk management.

    Who Should Enroll: This course is ideal for IT and cybersecurity professionals, compliance officers, risk managers, business leaders, and anyone interested in mastering the art and science of ISO 27005:2022 risk assessment.

    Course Goals: By the end of this course, participants will be able to confidently conduct risk assessments and develop comprehensive risk treatment plans in alignment with ISO 27005:2022 standards, leveraging the practical experience gained from the HealthSecure Inc. case study.

    Join us to enhance your skills in information security risk assessment and contribute to the robust security posture of your organization.

    Who this course is for:

    • Information Security Professionals: Ideal for those working in or aspiring to work in information security roles, including security analysts, managers, and consultants who seek to deepen their understanding of risk assessment in line with ISO standards.
    • IT Professionals: IT staff responsible for managing and safeguarding digital assets. The course is particularly beneficial for those involved in developing or maintaining an Information Security Management System (ISMS).
    • Compliance Officers and Auditors: Professionals involved in ensuring regulatory compliance or conducting internal audits within organizations, especially in sectors with stringent data protection and privacy regulations.
    • Business Managers and Executives: Decision-makers who need to understand the risk landscape of their organizations to make informed decisions about information security strategies and investments.
    • Project Managers and Developers: Individuals responsible for overseeing IT projects, including software development, who need to incorporate risk management into their project lifecycle.
    • Students and Academics: Learners in the fields of cybersecurity, information technology, or business management who aim to gain a comprehensive understanding of risk assessment methodologies and practices.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dr. Amar Massoud
    Dr. Amar Massoud
    Instructor's Courses
    PhD in computer science and IT manager with 33 years technical experience in various fields including IT Security, IT Governance, IT Service Management , Software Development, Project Management, Business Analysis and Software Architecture. I hold 60+ IT certifications such as :ISO 27001 Auditor, ComptIA Security+, GSEC, CEH, ECSA, CISM, CISSP, COBIT 2019 Implementor, COBIT 5 Assessor/Implementer TOGAF certifiedITIL 3 Expert, ITIL 4 Managing Profesional , ITIL 4 StrategistLean Specialist, VSM SpecialistPMP, PMI-ACP, Prince2 Practitioner, Praxis, Scrum Master, PMI RMP, MSP PMI-PBA, CBAP  Lean Six Sigma Black Belt, ISO 9001Azure Administrator, Azure Devops Expert, AWS PractitionerAnd many more.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 48
    • duration 4:27:06
    • English subtitles has
    • Release Date 2024/02/14