Building up information security according to ISO 27005 Training Course
This course equips you with the necessary skills to establish information security practices in accordance with ISO 27005, a standard focused on information security risk management grounded in ISO 27001.
This course is available as onsite live training in Romania or online live training.Course Outline
1. Introduction to Risk Management
2. Risk Assessment Methodologies
3. The ISO 27005 Information Security Risk Management Framework and Process Model
4. Classification and Identification of Information Assets
5. Defining Threats to Information Assets
6. Identifying Vulnerabilities Exploitable by These Threats
7. Risk Analysis: Scoring and Simple Calculations
8. Introduction to Risk Analysis Tools
9. Risk Evaluation and Acceptance Strategies
10. Risk Treatment and Selection of Mitigating Controls
11. Review and Continuous Improvement of Risk Assessment and Management
12. Risk Communication and Consultation
13. Integrating the ISO 27005 Risk Management Framework into an ISO 27001 ISMS
Open Training Courses require 5+ participants.
Building up information security according to ISO 27005 Training Course - Booking
Building up information security according to ISO 27005 Training Course - Enquiry
Building up information security according to ISO 27005 - Consultancy Enquiry
Testimonials (4)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
Upcoming Courses
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
- Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Micro Focus ArcSight ESM Advanced
35 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
- Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
- Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
- Develop and implement ArcSight lists and rules for effective event correlation and alerting.
- Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–11, the implementation timeline for these amendments was extended until March 31, 2019. The framework enhances bank capital requirements by boosting liquidity and reducing leverage.
Unlike Basel I and II, Basel III mandates distinct reserve levels for various deposit types and borrowings. Rather than replacing its predecessors, it functions alongside Basel I and Basel II to create a more comprehensive regulatory environment.
Navigating this complex and evolving landscape can be challenging. Our course and training are designed to help you anticipate changes and understand their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality are current and highly effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Equip attendees with practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk management responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of Risk Management teams
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations covering market, credit, counterparty, and liquidity risk
- Stress testing for various risk measures, including formulation and delivery methods
- Potential effects of Basel III on the international banking industry, with practical application demonstrations
- Need for the new Basel norms
- Overview of the Basel III norms
- Objectives of the Basel III norms
- Timeline for Basel III implementation
CCTV Security
14 HoursThis instructor-led, live training in Romania (online or onsite) is designed for security managers who wish to develop basic to intermediate-level skills in CCTV security surveillance and management.
By the end of this training, participants will be able to:
- Identify various types of CCTV systems and understand their benefits and features.
- Grasp the requirements for cabling and setting up CCTV systems.
- Install, configure, and manage CCTV systems effectively.
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Romania (online or onsite) is designed for advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
Upon completing this training, participants will be able to:
- Acquire comprehensive knowledge of fraud examination principles and processes.
- Identify, investigate, and prevent various forms of financial fraud.
- Understand the legal framework surrounding fraud, including its legal elements, applicable laws, and regulations.
- Develop practical skills for conducting fraud investigations, such as evidence collection, interviewing techniques, and data analysis.
- Design and implement effective fraud prevention and deterrence programs within organizations.
- Gain the confidence and knowledge necessary to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day training event (CGEIT preparation) serves as the ideal groundwork for exam day, designed to maximize your chances of passing the challenging CGEIT certification on your first try.
The CGEIT designation is an internationally acclaimed symbol of excellence in IT governance, awarded by ISACA. It is specifically tailored for professionals tasked with managing IT governance or those holding significant advisory or assurance roles within the field.
Earning CGEIT status will broaden your professional recognition in the job market and enhance your influence at the executive level.
Objectives:
This seminar is structured to prepare delegates for the CGEIT examination by helping them expand their existing knowledge and understanding, ensuring they are well-equipped to pass the exam as outlined by ISACA.
Target Audience:
The course is intended for IT and business professionals with substantial experience in IT governance who are preparing to sit for the CGEIT exam.
CipherTrust Manager
21 HoursThis instructor-led, live training in Romania (online or on-site) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Romania (online or onsite) is designed for compliance professionals in the payment sector who aim to develop, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
- Comprehend the regulations established by government regulators for payment service providers.
- Develop the internal policies and procedures necessary to meet regulatory requirements.
- Establish a compliance program that aligns with applicable laws.
- Ensure that all corporate processes and procedures adhere to the compliance framework.
- Safeguard the company’s reputation while protecting it from legal liabilities.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led live training in Romania (online or onsite) targets intermediate-level cybersecurity professionals who aim to enhance their grasp of GRC frameworks and apply them to ensure secure and compliant business operations.
By the conclusion of this training, participants will be able to:
- Comprehend the fundamental elements of cybersecurity governance, risk, and compliance.
- Perform risk assessments and formulate effective risk mitigation strategies.
- Execute compliance measures and handle regulatory obligations.
- Create and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert overview of the newly enacted Accessibility Law, providing developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the law's importance and implications, the course rapidly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
This course aims to equip participants with a solid grasp of GRC processes and capabilities, along with the necessary skills to effectively integrate governance, performance management, risk management, internal control, and compliance initiatives.
Course Overview:
- Key GRC terminology and definitions
- Foundational principles of GRC
- Core components, best practices, and activities
- The relationship between GRC and related disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO/IEC 27001 Lead Implementer
35 HoursThe landscape of information security threats and attacks is constantly evolving and becoming more sophisticated. The most effective defense strategy involves the proper implementation and management of information security controls and industry best practices. Furthermore, robust information security is a critical expectation and requirement for customers, legislators, and other stakeholders.
This training course is designed to equip participants with the skills needed to implement an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. It aims to provide a thorough understanding of ISMS best practices and establish a framework for its ongoing management and enhancement.
Upon completing the training course, participants are eligible to sit for the exam. Successful candidates may apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which validates their ability and practical knowledge to implement an ISMS aligned with ISO/IEC 27001 requirements.
Who Can Attend?
- Project managers and consultants involved in or concerned with the implementation of an ISMS
- Expert advisors aiming to master the implementation of an ISMS
- Individuals responsible for ensuring conformity to information security requirements within an organization
- Members of an ISMS implementation team
General information
- Certification fees are included in the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate awarding 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
- This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
- The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the operation of an information security management system and its processes based on ISO/IEC 27001
- Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management refers to the systematic oversight of the entire lifecycle of open-source components within an organization, ensuring their secure, compliant, and efficient utilization.
Delivered as an instructor-led, live training session (available online or onsite), this program targets intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be able to:
- Formulate effective OSS policies and establish robust governance frameworks.
- Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Reduce risks linked to licensing issues and security vulnerabilities.
- Accelerate OSS adoption while maximizing innovation and achieving cost savings.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Practical demonstrations using OSS management tools.
Customization Options
- This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Romania (online or onsite) offers a personal certification for industry professionals who want to showcase their expertise and comprehension of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
- Grasp the payment process and the PCI standards established to safeguard it.
- Comprehend the roles and responsibilities of entities within the payment industry.
- Gain deep insight into and understanding of the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and its application to organizations involved in the transaction process.