ISO/IEC 27005 Lead Risk Manager Training Course
The ISO/IEC 27005 Lead Risk Manager training provides you with the essential expertise to assist organizations in managing risks associated with all assets relevant to Information Security, using the ISO/IEC 27005 standard as a reference framework. Throughout this course, you will gain comprehensive knowledge of the process model for designing and developing an Information Security Risk Management program. The training also covers a thorough understanding of best practices for risk assessment methods such as OCTAVE, EBIOS, MEHARI, and harmonized TRA. This course supports the implementation of the ISMS framework outlined in the ISO/IEC 27001 standard.
After mastering all necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can take the exam and apply for the “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. Holding a PECB Lead Risk Manager Certificate demonstrates that you possess the practical knowledge and professional capabilities to support and lead a team in managing Information Security Risks.
Who should attend?
- Information Security risk managers
- Information Security team members
- Individuals responsible for Information Security, compliance, and risk within an organization
- Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001, or those involved in a risk management program
- IT consultants
- IT professionals
- Information Security officers
- Privacy officers
Examination - Duration: 3 hours
The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
- Domain 1 Fundamental principles and concepts of Information Security Risk Management
- Domain 2 Implementation of an Information Security Risk Management program
- Domain 3 Information security risk assessment
- Domain 4 Information security risk treatment
- Domain 5 Information security risk communication, monitoring and improvement
- Domain 6 Information security risk assessment methodologies
General Information
- Certification fees are included in the exam price
- Training material containing over 350 pages of information and practical examples will be distributed
- A participation certificate awarding 21 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
Course Outline
Day 1 Introduction to ISO 27005, concepts and implementation of a risk management program
- Section 01: Course objectives and structure
- Section 02: Standard and regulatory framework
- Section 03: Concepts and definitions of risk
- Section 04: Implementing a risk management programme
- Section 05: Context establishment
Day 2 Risk identification, evaluation, and treatment as specified in ISO 27005
- Section 06: Risk Identification
- Section 07: Risk Analysis
- Section 08: Risk Evaluation
- Section 09: Risk Assessment with a quantitative method
- Section 10: Risk Treatment
Day 3 Information Security Risk Acceptance, Communication, Consultation, Monitoring and Review
- Section 11: Information security risk acceptance
- Section 12: Information security risk communication and consultation
- Section 13: Information security risk monitoring and review
Day 4 Risk Assessment Methodologies
- Section 14: OCTAVE Method
- Section 15: MEHARI Method
- Section 16: EBIOS Method
- Section 17: Harmonized Threat and Risk Assessment (TRA) Method
- Section 18: Applying for certification and closing the training
Day 5 Certification Exam
Requirements
A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.
Open Training Courses require 5+ participants.
ISO/IEC 27005 Lead Risk Manager Training Course - Booking
ISO/IEC 27005 Lead Risk Manager Training Course - Enquiry
ISO/IEC 27005 Lead Risk Manager - Consultancy Enquiry
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
Upcoming Courses
Related Courses
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a comprehensive global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–11, the Accord’s implementation timeline has been extended to March 31, 2019. This framework enhances bank capital requirements by boosting liquidity reserves and reducing leverage ratios.
Unlike Basel I & II, Basel III introduces differentiated reserve requirements based on the specific types of deposits and borrowings, functioning alongside its predecessors rather than entirely replacing them. Navigating this intricate and evolving regulatory landscape can be challenging. Our course and training programs are designed to assist you in managing potential regulatory shifts and their implications for your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality remain current, relevant, and effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Develop practical strategies and techniques to define, measure, analyze, improve, and control operational risk within banking organizations.
Target Audience:
- Board members with risk oversight responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Staff in compliance, legal, and IT support functions
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulatory frameworks for market, credit, counterparty, and liquidity risk
- Stress testing methodologies for various risk measures, including formulation and delivery
- Projected effects of Basel III on the international banking industry, supported by practical demonstrations
- Rationale for adopting new Basel norms
- Overview of the Basel III Norms
- Objectives of The Basel III Norms
- Implementation Timeline for Basel III
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day course (CGEIT training) serves as the premier preparation for the examination, designed to equip you with the knowledge needed to successfully pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognized mark of excellence in IT governance, awarded by ISACA. It is tailored for professionals responsible for managing IT governance or those with significant advisory or assurance responsibilities in this domain.
Achieving CGEIT status will broaden your professional recognition in the marketplace and enhance your influence at the executive level.
Objectives:
This seminar aims to prepare delegates for the CGEIT examination by helping them supplement their existing knowledge and understanding, thereby better positioning them to pass the exam as defined by ISACA.
Target Audience:
This training course is intended for IT and business professionals who possess substantial IT governance experience and are undertaking the CGEIT exam.
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Norway (online or onsite) is designed for compliance professionals in the payment services sector who aim to design, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
- Grasp the regulatory requirements imposed by government authorities on payment service providers.
- Develop internal policies and procedures that align with governmental regulations.
- Establish a compliance program that adheres to applicable laws.
- Ensure that all corporate processes and procedures remain consistent with the compliance framework.
- Protect the business's reputation and shield it from legal liabilities.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led, live training in Norway (online or onsite) targets intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers a comprehensive introduction to the recently enacted Accessibility Law, providing developers with the practical expertise needed to design, develop, and sustain fully accessible applications. Beginning with an analysis of the law's significance and broader implications, the curriculum rapidly transitions into practical coding techniques, essential tools, and testing methodologies to guarantee compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse objective:
Equip participants with a solid grasp of GRC processes and capabilities, enabling them to effectively integrate governance, performance management, risk management, internal control, and compliance activities.
Course summary:
- Essential GRC terminology and definitions
- Core principles of GRC
- Key components, best practices, and operational activities
- How GRC intersects with other professional disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
ISO 22301 Introduction
7 HoursThe ISO 22301 Introduction training course is designed to help you grasp the fundamental concepts of a Business Continuity Management System (BCMS).
Through participation in the ISO 22301 Introduction course, you will gain insight into the significance of a Business Continuity Management System and the advantages it offers to businesses, society, and government entities.
Who should attend?
- Individuals with an interest in Business Continuity Management
- Individuals wishing to acquire knowledge regarding the primary processes of a Business Continuity Management System (BCMS)
Learning objectives
- Comprehend the concepts, approaches, methods, and techniques employed to implement a Business Continuity Management System
- Understand the core components of a Business Continuity Management System
PECB ISO/IEC 27001 Lead Auditor
35 HoursISO/IEC 27001 Lead Auditor
The ISO/IEC 27001 Lead Auditor training equips you with the essential expertise to conduct Information Security Management System (ISMS) audits by applying internationally recognized audit principles, procedures, and techniques.
Why should you attend?
Through this training course, you will gain the knowledge and skills required to plan and execute both internal and external audits in compliance with ISO 19011 and the ISO/IEC 17021-1 certification process.
Through practical exercises, you will master audit techniques and develop the competence to manage an audit program, lead an audit team, communicate effectively with clients, and resolve conflicts.
Once you have acquired the necessary expertise to perform this audit, you can take the exam and apply for the “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you demonstrate that you possess the capabilities and competencies to audit organizations according to best practices.
Who should attend?
- Auditors looking to perform and lead Information Security Management System (ISMS) certification audits
- Managers or consultants aiming to master the Information Security Management System audit process
- Professionals responsible for maintaining conformance with Information Security Management System requirements
- Technical experts preparing for an Information Security Management System audit
- Expert advisors in Information Security Management
Learning objectives
- Understand the operations of an Information Security Management System based on ISO/IEC 27001
- Recognize the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the auditor’s role to plan, lead, and follow up on a management system audit in accordance with ISO 19011
- Learn how to lead an audit and an audit team
- Learn how to interpret the requirements of ISO/IEC 27001 within the context of an ISMS audit
- Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow up on an audit in compliance with ISO 19011
Educational approach
- This training combines theoretical knowledge with best practices used in ISMS audits
- Lecture sessions are supported by examples based on case studies
- Practical exercises are based on a case study involving role-playing and discussions
- Practice tests mirror the format of the Certification Exam
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training equips you with the essential expertise and knowledge to help an organization implement and manage Information Security controls as outlined in ISO/IEC 27002.
Upon completion of this course, you are eligible to sit for the exam and apply for the "PECB Certified ISO/IEC 27002 Lead Manager" credential. This PECB Lead Manager Certification demonstrates that you have mastered the principles and techniques required for implementing and managing Information Security controls in accordance with ISO/IEC 27002.
Who should attend?
- Managers or consultants aiming to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the process of implementing an Information Security Management System
- Individuals responsible for information security, compliance, risk, and governance within an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs, and CISOs
Learning objectives
- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods, and techniques necessary for the effective implementation and management of Information Security controls
- Comprehend the interrelationships between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the significance of information security to the organization's overall strategy
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives
Educational approach
- This training combines both theoretical knowledge and practical application
- Lecture sessions supplemented with examples from real-world cases
- Practical exercises based on case studies
- Review exercises designed to assist with exam preparation
- Practice tests that mirror the format of the certification exam
General Information
- Certification fees are included in the exam price
- Training material, comprising over 500 pages of information and practical examples, will be distributed to participants
- Participants will receive a certificate of participation awarding 31 CPD (Continuing Professional Development) credits
- In the event of an exam failure, you may retake the exam free of charge within 12 months
ISO 9001 and ISO 27001 – Interpretation and Internal Auditor
21 HoursISO 9001 and ISO 27001 stand as globally acknowledged benchmarks for quality management and information security management systems, respectively.
This instructor-led live training, available either online or onsite, is designed for intermediate-level professionals looking to master the interpretation of ISO 9001 and ISO 27001 standards and execute internal audits with confidence.
Upon completing this training, participants will be equipped to:
- Comprehend the core principles and mandatory requirements of both ISO 9001 and ISO 27001.
- Apply the interpretation of clauses and controls to real-world business contexts.
- Plan and carry out internal audits that align with ISO standards.
- Detect nonconformities and propose appropriate corrective measures.
Course Format
- Engaging lectures combined with group discussions.
- Simulated auditing exercises and in-depth case studies.
- Practical analysis of various quality and security scenarios.
Customization Options
- To arrange a tailored training session for this course, please reach out to us.
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all staff members who need a practical grasp of Compliance and effective Risk Management.
Course Format
The training employs a blended methodology comprising:
- Facilitated discussions
- Slide-based presentations
- Case studies
- Real-world examples
Learning Objectives
Upon completion of the course, participants will be able to:
Gain a robust understanding of the fundamental aspects of Compliance, alongside national and international initiatives focused on managing associated risks.
Articulate how organizations and their teams can establish an effective Compliance Risk Management Framework.
Outline the responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and understand how these roles are integrated within a business structure.
Identify critical risk areas within Financial Crime, particularly concerning international operations, offshore centres, and high-net-worth clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves overseeing the entire lifecycle of open-source components within an organization to ensure their secure, compliant, and efficient utilization.
This instructor-led training, available online or onsite, targets intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be equipped to:
- Develop effective OSS policies and governance frameworks.
- Leverage SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Reduce risks related to licensing and security vulnerabilities.
- Streamline the adoption of OSS while maximizing innovation and cost efficiencies.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Hands-on demonstrations with OSS management tools.
Customization Options
- This course can be tailored to align with your organization's specific OSS policies and toolchains. Please contact us to arrange customization.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Norway (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS).
By the end of this training, participants will be able to:
- Understand the payment process and the PCI standards designed to protect it.
- Understand the roles and responsibilities for entities involved in the payment industry.
- Have deep insight into, and understanding of, the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and how it applies to organizations that are involved in the transaction process.