ISO/IEC 27005 Risk Manager
Explore the ISO/IEC 27005
Risk Manager certification
Understand the process of developing, establishing, maintaining, and improving an information
security risk management framework based on the guidelines of ISO/IEC 27005.
Key features & benefits
Training delivery options
• Classroom
• Live online
• eLearning
• Self-study
Course inclusions
• Digital access to training materials via KATE
• Over 350 pages of information and practical examples
• Certification exam
• Free exam retake within 12 months (in case of failure)
• Attestation of course completion worth 21 CPD (continuing professional development) credits
Course outline
Select a lesson to explore detailed content:
Day 1
Introduction to ISO/IEC 27005 and risk management
Introduction to ISO/IEC 27005 and risk management
- Training course objectives and structure
- Standards and regulatory frameworks
- Fundamental concepts and principles of information security risk management
- Information security risk management program
- Context establishment
Day 2
Risk assessment, risk treatment, and risk communication and consultation based on ISO/IEC 27005
Risk assessment, risk treatment, and risk communication and consultation based on ISO/IEC 27005
- Risk identification
- Risk analysis
- Risk evaluation
- Risk treatment
- Information security risk communication and consultation
Day 3
Risk recording and reporting, monitoring and review, and risk assessment methods
Risk recording and reporting, monitoring and review, and risk assessment methods
- Information security risk recording and reporting
- Information security risk monitoring and review
- OCTAVE and MEHARI methodologies
- EBIOS method and NIST framework
- CRAMM and TRA methods
- Closing of the training course
Our partners & vendors







Ready to grow your cybersecurity career?
Prerequisite courses & knowledge
Core knowledge
Fundamental understanding of ISO/IEC 27005
Comprehensive knowledge of information security
Certification requirements
Two years of professional experience (one year of work experience in information security risk management)
A total of 200 hours of Information security risk management activities
Training & register details
TRAINING OVERVIEW
ISO/IEC 27005
Risk Manager
Understand the process of developing, establishing, maintaining, and improving an information security risk management framework based on the guidelines of ISO/IEC 27005

Training duration: 3 days

Format: live online

Level: intermediate

Language: ukrainian

Materials: digital access via KATE app

Labs: practical exercises based on a case study

Exam attempts: 1 attempt + 1 free retake within 12 months
HOW TO REGISTER
1. Submit your application
Submit a quick application to let us know you’re interested in the course.
2. Intro call
We’ll schedule a short call to learn more about your goals and expectations.
3. Confirm your spot
Get accepted and complete the paperwork. We’ll send you all the info you need.
4. Start learning
Access your learning platform and get familiar with the materials.
5. Join the community
Get access to the student chat, events, and mentorship opportunities.
Who is ISO/IEC 27002 Risk Manager for?
Security managers
Managers or consultants involved in or responsible for information security in an organization.
Risk professionals
Individuals responsible for managing information security risks and maintaining conformity with ISO/IEC 27001 requirements.
IT & security teams
Members of information security teams, IT professionals, and privacy officers.
Project managers
Project managers, consultants, or expert advisers seeking to master the management of information security risks.
FAQ
What is the ISO/IEC 27005 Risk Manager certification?
What does the certification exam cover?
The exam covers four main competency domains:
Domain 1: Fundamental principles and concepts of information security risk management
Domain 2: Implementation of an information security risk management program
Domain 3: Information security risk management framework and processes based on ISO/IEC 27005
Domain 4: Other information security risk assessment methods
