Information Security Risk Management
IT / CYBER PROFESSIONAL
Course Start Dates
09 September 2021
6 weeks / 2 months
11 November 2021
6 weeks / 2 months
Course Start Dates
24 Hours (Live Classroom)
4 hours / week
Our priority, your satisfaction!
You will able to perform a complete risk assessment, strategically assess risk management models for use in your own organization and learn best practices for developing security metrics.
Practical Cyber Security!
In this course, you will learn key principles of risk analysis and acquire the knowledge to implement risk management concepts in your organization so the processes’ maturity can be enhanced and the gap between IT and Business can be reduced.
Information Security Risk Management Training
Head Lecturer: Alejandro Guinea
More than 15 years of experience in the Information Security field.
- Offensive Security Certified Professional (OSCP)
- Certified Information Systems Security Professional (CISSP)
- Information Systems Security Architecture Professional (ISSAP).
- CISSP Official Instructor
- Certified Information Systems Auditor (CISA)
- Certified in Risk and Information Systems Control (CRISC)
- Certified Ethical Hacker (CEH)
- ITIL v3 Foundation Certificate in IT Service Management
- COBIT 5
- ISO 27001 Lead Implementer
Prerequisites / Equipments
- Basic IT Background
- Basic InfoSec knowledge
- Basic Ethical Hacking knowledge
- Basic programming skills
- Basic business needs and goals understanding
A laptop or computer that can use conference call software. Basic programs such as excel, word, and PDF reader must be installed as well.
- Computer Science / Cyber Security students looking to gain real-world knowledge.
- Career professionals looking to make the jump into security risk management work.
- Engineers looking to improve their understanding of security risks.
- Business Managers trying to qualify and quantify cyber security risk
- CISO and CIOs trying to govern information security controls and measures.
- Students trying to pass certifications such as CISSP, CISM, Security plus, etc.
By the end of this course, you should be able to:
- Understand governance and management objectives
- Think practically about risk management
- Implement a platform for establishing a governance program
- Understand the Cornerstone Information Security Concepts
- Learn qualitative and quantitative risk analysis
- Understand the importance and how to create a Business Impact Analysis
- Correctly assess compliance and regulatory issues
- Implement actions and controls over cloud environments
- Understand the process and business maturity measurements as well as capability measurements
- Understand information technology and business’ governance and management concepts.
- Understand how cryptography is an important part of information security
- Understand technical, physical, and administrative information security controls.
- Implement controls and solutions to close the gap between business goals and IT goals.
- and more...
The entire course is live and interactive. All students will have direct access to their own lab, online campus, the teacher’s screen, and the live class itself, they’ll have a big advantage over traditional face-to-face classes.
We will use several standards and publications in this course:
- CSA STAR matrix
- MITRE ATTACK framework
Classes will be recorded for the students so they can review the material.
The course will be divided into the following modules:
- Security and risk management
- Asset and information governance
- Information security controls and models
- Infrastructure and network security
- Identity and access management
- Ethical Hacking and Security audits
- IoT Security
- Information security in the software development lifecycle
Students will need to finish one module before they move to the next one.
The student will take 10 weeks to complete the course, taking 2 hours per class each week.
- Live Classes / Video conferencing
- Email / Instant messaging / Social networks
Students can contact the teacher at any time they want. The teacher will reply as soon as possible.
Live classes will be performed so students can also ask live questions if they have any.
- Live class exercises and presentations
- Final project presentation
After successfully completing the course, the Swiss Cyber Academy provided training certificates for each participant in an electronic format.