Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, key terms, and the difference between resilience and security, along with the advantages of implementing cyber resilience. It then delves into risk management, detailing the essential activities required to address risks and opportunities. The course further explores how common management standards and best practice frameworks can contribute to achieving cyber resilience. Following this, it identifies the processes involved in cyber resilience, including the associated control objectives, interactions, and activities that need to be aligned with corresponding IT service management (ITSM) tasks. In the concluding section of the course, it explains the importance of segregating duties and implementing dual controls in relation to the roles and responsibilities within cyber resilience.
This course is available as onsite live training in Serbia or online live training.Course Outline
- Design and deliver cyber resilient strategies and services across your organization in line with your business needs
- Integrate cyber resilience into your existing systems and processes
- Establish a common language for cyber resilience across your organization
- Minimize the damage from a security breach and enable speedy response and recovery.
Requirements
- Basics of organization charts and employees roles
- Understanding the basics of cyber security
- It is recommended to attend the ITIL foundation before this course
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (1)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is tailored to assist participants in developing organizational resilience against various threats, ensuring that businesses can respond effectively to incidents, maintain operational continuity, and protect their interests.
BCS Practitioner Certificate in Business Continuity Management
21 HoursWho is it for:
This certification is designed for anyone involved in the fields of information security and information assurance.
It is also relevant to individuals who require a comprehensive understanding of Business Continuity Management, as well as those working in areas related to information security and information assurance.
What will I learn:
Candidates will be able to demonstrate:
- The importance and role of business continuity management within an organization
- The stages involved in the business continuity management life cycle
- The key components of a business continuity management program
- The significance of risk assessment in business continuity management
- The various options for developing a business continuity management strategy
- How to prepare and develop plans for responding to business continuity challenges
- The importance of testing, maintaining, and reviewing these plans
- The necessity of fostering awareness and understanding of business continuity management within the organization
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
This course is designed for anyone involved in the fields of information security and information assurance.
What will I learn:
Upon completion, participants will be able to:
- Demonstrate how managing information risk can bring significant benefits to a business.
- Explain and effectively use the terminology associated with information risk management.
- Conduct thorough threat and vulnerability assessments, as well as business impact analyses and risk evaluations.
- Understand the principles of controls and risk treatment strategies.
- Present assessment results in a format that can serve as the foundation for a risk treatment plan.
- Utilize information classification schemes effectively.
Certified Chief Information Security Officer (CCISO)
35 HoursEC-Council’s CCISO Program has certified top-tier information security professionals globally. A dedicated group of high-level information security executives, known as the CCISO Advisory Board, played a crucial role in shaping the program. They laid the groundwork by defining the exam content, body of knowledge, and training curriculum. Members of the board contributed in various capacities—some as authors, others as exam writers, quality assurance specialists, or trainers. Each component of the program is designed with aspiring CISOs in mind, aiming to pass on the expertise of seasoned professionals to the next generation, focusing on the most critical areas for developing and maintaining a successful information security program.
The Certified CISO (CCISO) program is a pioneering training and certification initiative aimed at producing elite information security executives. Unlike other programs that focus solely on technical knowledge, the CCISO emphasizes the practical application of information security management principles from an executive perspective. Developed by current CISOs for both existing and aspiring CISOs, this program ensures a comprehensive approach to leadership in the field of information security.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This class is designed as an intense and rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The course will cover the latest four domains of ISACA’s CRISC syllabus, with a strong emphasis on exam readiness. When you attend, you will receive the Official ISACA CRISC Review Manual and the Question, Answer, and Explanation (Q&A&E) supplement. The Q&A&E is particularly useful for helping delegates understand the style of questions used by ISACA, the type of answers they expect, and it aids in rapid retention of the material.
The technical skills and practices promoted and evaluated by ISACA within the CRISC certification are essential for success in the field. Achieving the CRISC certification demonstrates your expertise and commitment to the profession. With a rising demand for professionals with risk and control knowledge, ISACA’s CRISC has become the preferred certification program for individuals and organizations worldwide. The CRISC certification signifies a dedication to serving an enterprise and the chosen profession with excellence.
Objectives:
- To help you pass the CRISC examination on your first attempt.
- To signify your commitment to serving an enterprise with distinction through this certification.
- To leverage the growing demand for professionals with risk and control skills, allowing holders of this certification to secure better positions and salaries.
You will learn:
- How to assist enterprises in achieving their business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices promoted by CRISC, which are the foundational elements of success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO 27005 Risk Manager
21 HoursThis training course teaches how risk assessment for information security is done by combining the information on ISO/IEC 27005:2022 and ISO/IEC 27001. In addition to theoretical knowledge, this training course is equipped with practical exercises, quizzes, case studies, all of which make it a very engaging training course.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner' course that emphasizes practical exercises to reinforce the concepts being taught and build delegates' confidence in implementing business continuity management. The course also encourages active debate and the sharing of knowledge and experience among participants. Delegates will benefit from the practical and extensive expertise of our trainers, who are experienced business continuity management professionals and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the importance of business continuity management (BCM) in all organizations
- Define the business continuity lifecycle
- Manage a business continuity program effectively
- Understand their organization well enough to identify mission-critical impact areas
- Determine an appropriate business continuity strategy for their organization
- Establish a robust business continuity response
- Conduct, maintain, and review plans
- Integrate business continuity into the organizational culture
- Define key terms and definitions relevant to business continuity
By the end of the course, delegates will have a comprehensive understanding of all the essential components of business continuity management and will be equipped to return to their roles and make significant contributions to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course delves into the fundamental principles of security and IT Security, focusing on safeguarding against network attacks. Participants will acquire a comprehensive understanding of key security protocols and the security aspects of web services. The course will also reference recent attacks on cryptosystems and highlight some of the associated vulnerabilities.