Open FAIR™ Foundations (OFR_120)

Cyber Risk Quantification Training

Join the thousands of security and risk professionals embracing the Open FAIR™ cyber risk quantification movement.

HealthGuard University's Open FAIR™ Foundations is an online live instructor-led course that will give you the jump-start you need to begin quantifying cyber risk and pass the Open FAIR™ Foundation exam.

Upon completion of this course, participants will be able to:

  • Understand and apply FAIR risk analysis concepts
  • Demonstrate an understanding of FAIR risk terminology
  • Interpret and communicate results from FAIR risk analysis
  • Demonstrate an understanding of the FAIR risk analysis process
  • Demonstrate an understanding of how risk elements can be measured
  • Demonstrate an understanding of the Open FAIR™ certification program 

Each student that successfully completes the course will receive:

1. Certificate of Completion

2. 16 CPE credits

3. Voucher to sit for Open FAIR™ Foundations certification exam

Pricing

Online instructor lead course - $1,299 

Payment

We provide you two ways to pay. 

  1. Secure online payment via PayPal / credit card
  2. Via Purchase Order / Invoice

If you would like to pay by PayPal / credit card, select the "Add to Cart" button below, enter the number of seats you would like to purchase.


Class Schedule

Note: There are a several courses listed on the class schedule.

The Open FAIR™ Foundations course ID is OFR_120. 


FAQ

Q: Is any prior knowledge necessary to take this course? 

A: No prior knowledge or experience with FAIR or quantitative risk analysis is necessary.  

Q: Who would benefit from this course?

A: This course is intended for IT security analysts, auditors, risk managers, risk analysts, and 3rd party risk assessors.

Q: What is Open FAIR™? 

A: Open FAIR™ (Factor Analysis of Information Risk) is the go-to standard for cyber risk quantification. It provides a framework for understanding, analyzing, and quantifying information risk in financial terms. You can learn more here.


>