課程簡介
1. 風險管理簡介
2. 風險評估方法
3. ISO 27005 資訊安全風險管理框架和流程模型
4. 資訊資產的分類和識別
5. 對資訊資產的威脅定義
6. 識別這些威脅可能利用的漏洞
7. 風險分析:使用量表和簡單計算進行風險評分
8. 風險分析工具簡介
9. 風險評估和驗收策略
10. 風險處理和緩解控制措施的選擇
11. 風險評估和管理的審查和持續改進
12. 風險溝通和諮詢
13. 將 ISO 27005 資訊安全風險管理框架整合到 ISO 27001 ISMS 中
客戶評論 (5)
報告和規則設置。
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
機器翻譯
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely enjoyed the real examples of the trainer.