Curriculum
- 1 Section
- 16 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Training Course Structure16
- 1.1Training course objectives and structure
- 1.2Standards and regulatory frameworks
- 1.3Fundamental concepts and principles of information security risk
- 1.4Information security risk management program
- 1.5Context establishment
- 1.6Risk identification
- 1.7Risk analysis
- 1.8Risk evaluation
- 1.9Risk treatment
- 1.10Information security risk communication and consultation
- 1.11Information security risk recording and reporting
- 1.12Information security risk monitoring and review
- 1.13OCTAVE and MEHARI methodologies
- 1.14EBIOS method and NIST framework
- 1.15CRAMM and TRA methods
- 1.16Closing of the training course
CRAMM and TRA methods
Prev