This training allows you to learn the Ebios RM methodology (Expression of needs and identification of security objectives), a method recognized by the ANSSI.
During this training, you will acquire by alternating theoretical and practical time, skills and abilities to carry out an Ebios RM study.
You will develop a practical case from start to finish, allowing you to understand all the ins and outs of risk management with Ebios RM.
Distance learning training
Overview
- Understand the process of a risk management approach in information security based on RM EBIOS and embedded methodological measures
- Ensure an efficient technical management of risks through the RM EBIOS method
- Develop skills about method execution through practical cases of information security risk management
- Request “EBIOS Risk Manager Certified” qualification according to your level of experience.
Course Curriculum
Session 1
Key
concepts
- Risk management
- Ebios RM – overview
- The fundamentals of Ebios RM
Session 2
Workshop 1 – Scope and security baseline
- Analyze the object of the study
- Define the security baseline
- Which decisions?
Session 3
Workshop 2 – sources
of risks
- Determine the sources of risk (SR) and the targeted objectives (TO)
- Map the SR / TO couples
- Which decisions?
Session 4
Workshop 3 – Strategic scenarios
- Map digital threats
- Identify strategic scenarios
- Which decisions?
Session 5
Workshop 4 – Operational scenarios
- Identify operational scenarios
- Evaluate the risks
- Which decisions?
Session 6
Workshop 5 – Risk Treatment
- Risk Treatment Plan
- Which decisions?
- Revisions
Principle planning
- 12 hours of classes with the trainer divided into 6 sessions of 1h30
- 10 hours of personal work time in autonomy
Monday | Tuesday | Wednesday | Thursday | Friday | |
---|---|---|---|---|---|
Week 1 | Introduction | Session 1 | Session 2 | Session 3 | |
Week 2 | Session 4 | Session 5 | Session 6 | Review | Exam |
Learning
Assessment
- 4H closed book distance learning exam
- 2H of MCQs
- 2H of case study
The +
- Training provided by a cybersecurity expert
- An intuitive and easy-to-use platform
- Exchange moments on key concepts and experience sharing adapted to the learners’ context
- A training pedagogy adapted to all learning profiles
Who should attend?
- Security Officers
- Risk managers
- DPO
- Project managers or consultants wishing to master EBIOS methodology implemenation in a company
- CxOs and managers responsible for IT management or risk management
- Information security team members
- Information technology expert / consultants
- Technical experts who want to prepare for an information security or CISO position
Prerequisites
- General knowledge of information systems
- General knowledge of information systems security
- General knowledge of risk management
How and
when to access
The participant is considered registered when:
- The prerequisites and needs are identified and validated
- The training agreement is signed
Registration requests can be sent up to 5 working days before the start of the training.
Accessibility
Whether you are recognized as having a disability or not, making our training accessible to everyone is part of our commitment. If you need compensation or adaptation for the content, the supports, the place, the material used, the schedules, the rhythm, we are at your disposal.
Would you like more information?
contact us by filling out this form