Certified Risk Manager

Created by LEC Team
Last updated Wed, 18-Jan-2023
Download as pdf

Based on practical exercises and case studies, you will have the opportunity to acquire the necessary skills to perform stakes analysis and classification, evaluate the security services, conduct risk analysis, and define security plans.

After mastering all the necessary concepts of risk analysis using the MEHARI method, you can sit for the exam and apply for a “PECB Certified MEHARI Risk Manager” credential. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support an organization in performing risk assessment based on the MEHARI method.

 

Learning objectives

  • Understand the concepts and general principles associated with the MEHARI risk analysis method

  • Gain a thorough understanding of the four phases of the MEHARI approach

  • Develop the necessary skills to identify malfunctions, analyze scenarios of each malfunction, identify the malfunction value scale and prepare a formal classification of the information system assets

  • Develop the necessary skills to evaluate the quality of security services in an organization based on the MEHARI method

  • Understand MEHARI risk model

  • Develop the necessary skills to characterize risk, analyze risk situations and conduct a quantitative analysis of a risk situation

  • Acquire the necessary skills to develop security plans based on the MEHARI approach



Day 1
Introduction to concepts and phases of MEHARI risk analysis method
<p><span id="docs-internal-guid-a045a2c8-7fff-4a7e-0e1f-ccf739b54c8d"></span></p><ul style="margin-top:0;margin-bottom:0;padding-inline-start:48px;"><li dir="ltr" style="list-style-type:disc;font-size:10pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;" aria-level="1"><p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:14pt;margin-bottom:0pt;" role="presentation"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Introduction to concepts and phases of MEHARI risk analysis method</span></p></li></ul>

Day 2
Conducting risk analysis using the MEHARI method
<p><span id="docs-internal-guid-d9c5c9b1-7fff-7e8f-3fd3-e207feae1019"></span></p><ul style="margin-top:0;margin-bottom:0;padding-inline-start:48px;"><li dir="ltr" style="list-style-type:disc;font-size:10pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;" aria-level="1"><p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;" role="presentation"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">&nbsp;Conducting risk analysis using the MEHARI method</span></p></li></ul>

Day 3
Security planning according to MEHARI method and Certification Exam
<p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 14pt 0pt;"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Examination Duration: 2 hours</span></p><p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:0pt;margin-bottom:14pt;"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">The exam covers the following competency domains:</span></p><p><span id="docs-internal-guid-61a99c0d-7fff-e443-17ea-f30fa5b4c76b"></span></p><ul style="margin-top:0;margin-bottom:0;padding-inline-start:48px;"><li dir="ltr" style="list-style-type:disc;font-size:10pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;" aria-level="1"><p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:14pt;margin-bottom:0pt;" role="presentation"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Domain 1 Fundamental concepts, principles, and approaches of information security risk management based on the MEHARI method</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:10pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;" aria-level="1"><p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;" role="presentation"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Domain 2 Implementation of an information security risk management program based on the MEHARI method</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:10pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;" aria-level="1"><p dir="ltr" style="line-height:1.2;background-color:#ffffff;margin-top:0pt;margin-bottom:14pt;" role="presentation"><span style="font-size:12pt;font-family:'Open Sans',sans-serif;color:#212529;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Domain 3 Information security risk assessment based on the MEHARI method</span></p></li></ul>

Enquiry form
+ View more
Other related courses
00:00:00 Hours
0 0 $0
00:00:00 Hours
Updated Mon, 27-Mar-2023
0 0 $0
00:00:00 Hours
Updated Mon, 27-Mar-2023
0 0 $0
00:00:00 Hours
Updated Mon, 27-Mar-2023
0 0 $0
00:00:00 Hours
0 0 $0
Dates Venues Price Details