Packt
Information Security Risk Management for ISO 27001/ISO 27002
Packt

Information Security Risk Management for ISO 27001/ISO 27002

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

8 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

8 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Identify key phases of information risk management

  • Differentiate between qualitative and quantitative risk analysis

  • Define clear objectives for security risk management

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

December 2025

Assessments

17 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 17 modules in this course

In this section, we examine risk definitions from NIST and ISO 27000, focusing on impact, likelihood, and alignment with organizational objectives for effective information security management.

What's included

2 videos2 readings1 assignment

In this section, we examine ISO 27001-compliant risk assessment methodologies, comparing qualitative and quantitative approaches to evaluate and manage information security risks effectively.

What's included

1 video3 readings1 assignment

In this section, we cover risk assessment approaches and aligning risk strategies with organisational goals.

What's included

1 video2 readings1 assignment

In this section, we examine role definitions for risk management, focusing on ISO 27001 and ISO 27005 compliance to ensure clear responsibilities and authorities for information security tasks.

What's included

1 video2 readings1 assignment

In this section, we explain how to choose risk assessment tools that support ISO 27001 compliance and streamline ISMS processes.

What's included

1 video2 readings1 assignment

In this section, we examine how information security policy and scope establish the framework for ISMS implementation, guiding risk assessment and aligning security activities with organizational objectives.

What's included

1 video1 reading1 assignment

In this section, we examine the mandatory ISO 27001 risk assessment steps, compare them with codes like ISO 27002, and explore how to apply supplementary guidance for effective ISMS implementation.

What's included

1 video1 reading1 assignment

In this section, we examine the identification and classification of information assets for risk assessment, focusing on sensitivity, ownership, dependencies, and control mapping within the ISMS scope.

What's included

1 video3 readings1 assignment

In this section, we explore threats and vulnerabilities, emphasizing their combined impact on information security. Understanding their relationship is critical for effective risk management.

What's included

1 video2 readings1 assignment

In this section, we compare asset-based and scenario-based risk methods, identify security-impacting scenarios, and assess event consequences using ISO 27000 definitions for effective risk management.

What's included

1 video1 reading1 assignment

In this section, we examine how to evaluate risk impacts on asset confidentiality, integrity, and availability, and categorize losses based on business, legal, and contractual factors for effective control prioritization.

What's included

1 video4 readings1 assignment

In this section, we examine vulnerability exploitation likelihood, assess threat impact through defined scenarios, and align risk responses with organizational risk appetite for effective decision-making.

What's included

1 video1 reading1 assignment

In this section, we examine how to calculate risk levels using impact and likelihood, categorize risks into low, medium, or high, and define thresholds for organizational risk management.

What's included

1 video1 reading1 assignment

In this section, we cover the four risk treatment options-avoid, retain, modify, and share-based on ISO 27001 guidelines.

What's included

1 video2 readings1 assignment

In this section, we examine the Statement of Applicability (SoA) and its role in documenting control selections and justifications within an ISMS. Key concepts include risk treatment planning and control implementation mapping.

What's included

1 video1 reading1 assignment

In this section, we examine gap analysis and risk treatment planning for ISO 27001 controls. It focuses on prioritising implementation based on risk levels and systematically addressing threats to critical systems.

What's included

1 video1 reading1 assignment

In this section, we examine the importance of continuous risk assessment reviews to maintain ISMS effectiveness, focusing on triggers, control evaluation, and alignment with evolving threats and compliance requirements.

What's included

1 video1 reading1 assignment

Instructor

Packt - Course Instructors
Packt
1,177 Courses288,921 learners

Offered by

Packt

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions