To understand the concepts, approaches, methods and techniques allowing an effective management of risk according to ISO 27005
To interpret the requirements of ISO 27001 on information security risk management
To understand the relationship between the information security risk management, the security controls and the compliance with the requirements of different stakeholders of an organization
To become familiar with the most used risk management methods on the market as NIST 800-30, Microsoft Security Risk Management Guide, OCTAVE, Harmonized TRA, EBIOS and MEHARI