Vulnerabilities and Risk Management Course


A correct protection of assets goes through the identification and analysis of threats and risks to make correct decisions in investments in Cybersecurity. With this training module, the necessary knowledge is acquired to face these tasks adequately, as well as compliance with the GDPR that requires the identification and treatment of risks.

Thus, at the end of the training, the necessary knowledge will have been acquired for the identification of risks and vulnerabilities, as well as their management, the first and fundamental phase to address the cybersecurity of the organization and treat, analyse and mitigate the existing risks.

Addressed to

Compliance managers and IT managers with basic or no knowledge of Cybersecurity. Asset managers, security managers according to National security (ENS), GDPR, ISO 27001 and interested in Cybersecurity.

Threats, Vulnerabilities and Risks

Definitions, relationships and differences
Types of Threats
According to its origin
According to purpose
Types of Vulnerabilities
Specific IoT vulnerabilities
Social engineering
Advanced persistent threats (APTs)

Risk analysis

Quantitative and qualitative analysis
Relational model
Identification and Classification
Evaluation and analysis

Hours and duration

6-hour course (two 3-hour days)

Place of delivery

NexTReT Barcelona | On-line




Sign up through the email (limited places).