ISO 31000. Risk manager training
4.4 (317 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,103 students enrolled

ISO 31000. Risk manager training

The risk management framework of ISO 31000 and the risk techniques of IEC 31010
4.4 (317 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,103 students enrolled
Last updated 3/2020
English
English
Current price: $30.99 Original price: $44.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 41 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • The risk management framework of ISO 31000
  • Principles of risk management
  • Selection of the risk assessment techniques
  • Risk techniques of IEC 31010
  • Risk treatment options
Requirements
  • Basic information about management system standards is valuable but not necessarily needed
Description

The purpose of this course is to present the framework for risk management proposed by ISO 31000 along with the multiple risk techniques from IEC 31010 (a supporting standard for ISO 31000).

After going through the lessons you will have a good understanding of the risk management principles, the framework of ISO 31000, risk assessment techniques or available risk treatment options.


The structure of the course includes:

- general aspects about risk management and the framework proposed by ISO 31000

- risk management principles

- the support and involvement of top management for the risk management process

- the risk assessment process and the selection of the appopriate risk techniques

A brief presentation of the general aspects of risk techniques from IEC 31010 including:

- Brainstorming;

- Structured and semi-structured interviews;

- the Delphi technique;

- HAZOP (Hazard and Operability);

- HACCP (Hazard Analysis and Critical Control Points);

- Business impact analysis;

- Root cause analysis;

- FMEA and FMECA - Failure Modes and Effects (and Criticality) Analysis;

- Fault tree analysis;

- Event tree analysis;

- Cause -  consequence analysis;

- Cause and effect analysis;

- Bow tie analysis;

- Reliability centered maintenance;

- Markov analysis;

- Monte Carlo simulation;

- Consequence probability matrix;

- Cost - benefit analysis;

- Multi criteria decision analysis;

and others.

The final part of the course is about risk treatment options, concepts like residual and secondary risk, monitoring and improvement of the risk management process.

The various risk techniques of IEC 31010 are explained in an easy to understand way with simple examples.

At the end of the course there is a quiz  - with questions from the subject matter.


Learn about how to develop and apply a risk management process by following the framework of ISO 31000.


Who this course is for:
  • Risk managers
  • Risk practioners
  • Risk professionals
  • Management system professionals
  • ISO consultants and auditors
Course content
Expand all 41 lectures 03:27:00
+ Risk management
5 lectures 23:42

About integrating, designing, implementing, evaluating and improving risk management.

Risk management framework
06:18

What is risk. What is risk management. What is a risk source and a control. The principles of risk management.

Risk management principles
04:11

About the involvement and support from top management for the risk management process

Leadership and commitment
05:02

Definitions for the three important elements that need to be specified with regards to the risk management process - scope, context, criteria

Scope, context and criteria
03:13

What risk assessment involves and the contribution of risk assessment to the risk management process

The risk assessment process
04:58
+ Risk techniques of IEC 31010
32 lectures 02:43:33

The criteria for selecting a risk assessment technique

Selection of risk assessment techniques
04:26

About brainstorming as risk assessment technique including its variation the brainwriting

Brainstorming
05:16

A set of questions that interviewees are asked with the aim of identifying risks associated to a certain situation, a product, a process, etc

Structured and semi-structured interviews
03:10

A group of experts who are asked to formulate their opinions anonimously on certain topics. Each one has access to the opinions of others with the purpose of finding consensus between the experts.

Preview 06:39

Checklists or checklist analysis is a technique that can be used to identify hazards and risks or to assess if certain controls are effective.

Checklists
02:47

About a risk technique usually used to identify hazardous situations and events that can cause harm to a system, a facility or an activity.

Preliminary hazard analysis (PHA)
03:00

Hazard and Operability - a guide word examination that looks for deviations from the design of a system or process due to deficiencies in the design in the components, procedures or due to human error.

HAZOP
09:23

Standard practice in the food sector, HACCP represents a method to identify hazards and to implement controls in relevant points of production processes.

Hazard Analysis and Critical Control Points (HACCP)
05:42

A risk technique used to evaluate the risks to humans, plants and animals as a result of exposure to hazards such as chemicals, micro-organisms or other species

Toxicity assessment
04:10

A brainstorming method meant to serve as a simpler alternative to HAZOP. Involves What-if type of questions.

Structured "What - if" techniques (SWIFT)
06:16

Develop scenarios and possible outcomes - a risk technique that requires imagination

Scenario analysis
03:09

Identify the key activities and processes in an organization and their interdependencies, see how a disruptive event can affect the functioning of key activities and propose solutions so that the impact of a disruptive event can be managed and the organization can continue to operate at an acceptable level.

Business impact analysis
05:37

Starting from a major incident and trying to understand how and why it happened so that controls can be designed and implemented to prevent re-occurrence. The 5-whys technique

Preview 04:46

The Failure Modes and Effects Analysis is used to evaluate an item, a component, a process, a system to identify the ways (or modes) in which it can fail, the effects that those failures can have, the mechanisms of failure and how such failures can be avoided or their effects mitigated

FMEA and FMECA
07:59

A technique used to identify factors and conditions that contribute to the occurence of a certain undesired event – which is reffered to as the top event.

Fault tree analysis (FTA)
07:33

Similar logic to the fault tree. The starting point is an initiating event and the purpose is to identify the sequence of events that follow the initiating event, taking into consideration the systems and controls in place meant to mitigate the consequences of the initiating event

Event tree analysis (ETA)
03:50

A combination of Fault tree and event tree analysis

Cause-consequence analysis
03:58

The cause and effect analysis or diagram is a method to identify possible causes of an event. It organizes possible causes into categories and details them further into causes and subcauses.

Cause and effect analysis
04:27

This risk assessment technique is used to estimate the risks associated to an unwanted event by analyzing whethere there are sufficient layers of protection (or safeguards) in place to control or to mitigate the risk

Layers of protection analysis (LOPA)
04:57

The decision tree analysis is a graphic representation of outcomes that follow a certain decision.

Decision tree analysis
02:04

The Human reliability analysis deals with the impact of humans on system performance and is used to evaluate the consequences of human errors on the functioning of systems

Human reliability assessment (HRA)
04:26

The Bow tie analysis starts from a particular event wich is the central knot of the bowtie, then on the left we have the causes of the event and on the right we have its consequences

Bow tie analysis
05:50

About an approach to maintenance that is looking to identify the most appropriate maintenance strategy to ensure that an equipment, or a system that involves several equipments, functions at optimal levels

Reliability centered maintenance
09:09

A methodology to identify errors that come from the design of a product or a system. Sneak circuit and software sneak analysis.

Sneak analysis
03:08

A risk technique that is used for systems that move from one state to another.

Markov analysis
07:47

The Monte Carlo simulation is a computerized mathematical techinque which is used to provide a range of possible outcomes and the probability they will occur for any action or choice.

Monte Carlo simulation
05:22

The Bayes theorem or the Bayes law describes the probability of an event based on prior knowledge of conditions that may be related to the event. Any already known information (which is called the Prior) can be combined with subsequent measurement to establish an overall probabilty.

Bayesian statistics and Bayes nets
06:54

A graphical representation of the combination between probability of an event and the consequences it can have on a certain population

FN Curves
03:33

A risk index is a system of rating risks by applying scores to each component of the risk (like for example exposure, impact, source – if we speak of environmental related risks). By ranking risks then its easier to compare them.

Risk indices
02:27

Combining potential consequences with estimated probabilities to calculate a level of risk – which can be a number, can be a certain level on a scale or it can be expressed in any other form, is one of the most common risk assessment techniques

Consequence/ probability matrix
03:11

The idea in a cost/ benefit analysis is to compare total expected benefits of an action or a decision with total expected costs and make an informed decision based on the results

Cost-benefit analysis
04:41

Used when there are several different options that can be chosen and the purpose is to order them by preference and choose the best, based on some criteria

Multr-criteria decision analysis
07:56
+ Risk treatment, monitoring and improvement
3 lectures 15:26

About different risk treatment options - avoidance, share, mitigation, acceptance. Concepts like residual risk and secondary risk.

Preview 07:15

About what can be monitored in the risk management process and opportunities to improve risk management

Monitor, review and improve risk management
04:07
Conclusions
04:04
Risk management quiz
9 questions