Fundamentals of Risk Management in Information Security
6 classes
1.1 Define Key Terms in Information Security Risk Management
1.2 Identify the Components of a Risk Management Framework
1.3 Analyze the Role of Stakeholders in Risk Management
1.4 Evaluate Common Risk Assessment Techniques and Tools
1.5 Develop a Risk Treatment Plan for an Organization
1.6 Implement Continuous Risk Monitoring and Review Practices
ISO 27005 Overview and Framework Structure
6 classes
2.1 Explore the Key Principles of ISO 27005
2.2 Identify the Components of the ISO 27005 Framework
2.3 Analyze the Risk Management Process in ISO 27005
2.4 Evaluate the Importance of Context in Risk Assessment
2.5 Apply Risk Treatment Options in ISO 27005
2.6 Develop a Risk Management Plan Using ISO 27005 Guidelines
Risk Assessment Techniques and Tools
6 classes
3.1 Identify Key Risk Assessment Techniques Used in ISO 27005
3.2 Analyze Qualitative vs Quantitative Risk Assessment Methods
3.3 Evaluate the Role of Risk Matrices in Decision Making
3.4 Apply the Bowtie Method to Visualize Risk Scenarios
3.5 Utilize Risk Assessment Tools in Practical Case Studies
3.6 Develop a Comprehensive Risk Assessment Report Template
Risk Treatment and Response Strategies
6 classes
4.1 Identify Key Risk Treatment Options
4.2 Analyze Effectiveness of Response Strategies
4.3 Evaluate Cost-Benefit of Risk Treatments
4.4 Develop Risk Acceptance Criteria
4.5 Formulate a Risk Treatment Plan
4.6 Implement and Monitor Risk Response Strategies
Monitoring, Reviewing, and Continuous Improvement of Risk Management
6 classes
5.1 Assess Current Risk Management Practices
5.2 Identify Key Performance Indicators for Monitoring
5.3 Implement Effective Risk Review Processes
5.4 Analyze Data for Continuous Improvement
5.5 Develop Action Plans Based on Review Findings
5.6 Foster a Culture of Continuous Risk Management Improvement