Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, defining essential terminology, differentiating between resilience and security, and highlighting the advantages of adopting cyber resilience. It introduces risk management concepts and the core activities required to mitigate risks and capitalize on opportunities. Furthermore, it explains the importance of widely recognized management standards and best-practice frameworks in achieving cyber resilience. The course then identifies the specific cyber resilience processes, their associated control objectives, and the interactions and activities that must align with corresponding ITSM practices. Finally, it covers the segregation of duties and dual controls pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in Slovakia or online live training.Course Outline
- Design and deploy cyber resilience strategies and services across your organization, aligned with your business requirements
- Incorporate cyber resilience into your existing systems and operational processes
- Create a unified terminology for cyber resilience throughout your organization
- Reduce the impact of security breaches and facilitate rapid response and recovery
Requirements
- Fundamental understanding of organizational structures and employee roles
- Basic knowledge of cybersecurity principles
- Attending the ITIL Foundation course beforehand is recommended
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (2)
1. The BCS test exam questions were often incoherent or not related to the syllabus - which appears to be a trait of BCS course and exams 2. the subject matter was taught reading powerpoint slides full of text - the BCS should be providing at least some diagrammatic content and other visual aids especially as many people learn in very different ways - more than just reading text.
john - UKHO
Course - BCS Practitioner Certificate in Information Assurance Architecture (CIAA)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is designed to enable participants to strengthen organizational resilience against a variety of threats, ensuring that organizations can effectively respond to incidents, maintain business operational availability, and protect their interests.
BCS Practitioner Certificate in Business Continuity Management
21 HoursWho is it for:
Designed for professionals engaged in the fields of information security and information assurance.
This certification is particularly relevant for individuals seeking to gain a comprehensive understanding of Business Continuity Management, as well as those actively working within information security and assurance domains.
What will I learn:
Upon completion, candidates will be able to demonstrate:
- The role and necessity of business continuity management within an organization.
- The business continuity management life cycle.
- The key components of a business continuity management program.
- The importance of conducting risk assessments within business continuity management.
- The available options for developing a business continuity management strategy.
- How to prepare and develop plans for business continuity management response.
- The necessity of exercising, maintaining, and reviewing plans.
- The need to embed business continuity management awareness throughout the organization.
BCS Practitioner Certificate in Information Assurance Architecture (CIAA)
35 HoursTarget Audience
This program is designed for security professionals seeking to grasp both the technical and business dimensions of the field, as well as anyone aspiring to a career in security architecture.
- System Administrators aiming to transition into security architecture roles
- Technical architects looking to specialize in security architecture
Additionally, this certificate provides a complimentary certification pathway for individuals who are currently pursuing or have achieved CCP status in Information Assurance.
Learning Objectives
Upon completion, candidates will be equipped to:
- Analyze the business context and identify information risks relevant to specific systems.
- Articulate and implement core security design principles.
- Recognize information risks stemming from proposed solution architectures.
- Design alternative architectures or countermeasures to address identified risks.
- Validate that proposed architectures and countermeasures effectively mitigate identified information risks.
- Utilize standard security techniques and architectural models to manage security risks.
- Develop novel architectures that address risks introduced by emerging technologies and business practices.
- Offer consultancy and expert advice to clarify Information Assurance and architectural challenges.
- Configure ICT systems in strict compliance with approved security architectures.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursTarget Audience:
This certification is designed for professionals engaged in the fields of information security and information assurance.
Learning Outcomes:
Upon completion, candidates will be able to demonstrate:
- How effective management of information risk drives significant business value.
- The ability to articulate and utilize information risk management terminology accurately.
- Skills in conducting threat and vulnerability assessments, business impact analyses, and risk assessments.
- An understanding of the principles governing controls and risk treatment.
- The capability to present findings in a format suitable for developing a risk treatment plan.
- The application of information classification schemes.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the globally recognized and most sought-after certification for professionals specializing in IS audit and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-oriented training program. Having successfully delivered over 150 CISA training sessions across Europe and worldwide, and having trained more than 1,200 delegates, Net Security has developed its in-house CISA training materials with the primary objective of ensuring that delegates pass the ISACA CISA® Exam. Our training methodology emphasizes a deep understanding of CISA IS auditing concepts and extensive practice with ISACA question banks released in the last three years. Over time, CISA holders have become highly sought after by renowned accounting firms, global banks, advisory and assurance firms, and internal audit departments.
While delegates may possess years of experience in IT auditing, their ability to solve CISA questionnaires depends entirely on their understanding of globally accepted IT assurance practices. The CISA exam is notoriously challenging because it often presents two plausible answers where only one is correct, testing your grasp of global IT auditing standards. To address these challenges, we provide top-tier trainers with extensive international experience in delivering CISA training.
The Net Security CISA manual covers all exam-relevant concepts, case studies, and Q&As across the five CISA domains. Additionally, trainers provide key supporting materials during the course, such as CISA notes, question banks, a CISA glossary, videos, revision documents, exam tips, and CISA mind maps.
Goal:
The ultimate goal is to pass your CISA examination on the first attempt.
Objectives:
- Apply gained knowledge in a practical manner to benefit your organization
- Deliver audit services in compliance with IT audit standards
- Provide assurance on leadership, organizational structure, and processes
- Provide assurance on the acquisition, development, testing, and implementation of IT assets
- Provide assurance on IT operations, including service operations and third-party interactions
- Provide assurance on the organization’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets
Target Audience:
Finance/CPA professionals, IT professionals, Internal & External auditors, and Information security and risk consulting professionals.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Slovakia (online or onsite) targets beginner to intermediate-level system administrators and security professionals seeking to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course serves as an intensive, rigorous preparation for the ISACA Certified in Risk and Information Systems Control (CRISC) examination. The curriculum covers the most current four domains of the ISACA CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the official ISACA CRISC Review Manual along with the Question, Answer, and Explanation (Q&A&E) supplements, provided upon attendance. The Q&A&E resource is invaluable for helping attendees grasp the specific style of ISACA questions, identify the types of answers sought by examiners, and accelerate the assimilation of key concepts.
The technical competencies and practices endorsed and assessed by ISACA within the CRISC certification form the foundation for career success in this domain. Holding the CRISC certification validates your professional expertise. As the market demand for specialists with risk and control knowledge continues to rise, ISACA’s CRISC has become the preferred certification for professionals and organizations globally. This credential reflects a dedication to serving an enterprise and the profession with distinction.
Objectives:
- Enable you to pass the CRISC examination on your first attempt.
- Demonstrate your commitment to delivering distinguished service to an enterprise.
- Leverage the increasing market demand for risk and control expertise to secure better career positions and salary potential.
You will learn:
- How to help enterprises achieve their business goals by designing, implementing, monitoring, and maintaining efficient and effective IT controls based on risk.
- The technical skills and practices promoted by CRISC, which serve as the building blocks for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
This 'Practitioner'-level course is heavily focused on hands-on exercises designed to reinforce key concepts and build delegates' confidence in implementing business continuity management. It also encourages open debate and the exchange of knowledge and experience among participants.
Delegates will gain valuable insights from the trainers' extensive practical experience in business continuity management and their expertise as ISO 22301:2019 specialists.
Learning Outcomes:
- Explain the necessity of business continuity management (BCM) across all types of organizations
- Define the business continuity lifecycle
- Manage the business continuity programme effectively
- Gain sufficient understanding of an organization to identify mission-critical impact areas
- Determine the organization's business continuity strategy
- Establish an effective business continuity response
- Exercise, maintain, and review business continuity plans
- Embed business continuity practices within an organization
- Define terminology relevant to business continuity
By the end of the course, delegates will possess a detailed understanding of all key components of business continuity management, enabling them to return to their roles and make a significant contribution to their organization’s business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led live training in Slovakia (online or onsite) is designed for security engineers who aim to leverage IBM Qradar SIEM to address critical security use cases.
By the conclusion of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led live training in Slovakia (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course introduces fundamental principles of security and IT security, focusing on strategies to defend against network attacks. Participants will develop a solid understanding of critical security protocols and the security frameworks underlying web services. The curriculum also examines recent attacks targeting cryptosystems and highlights associated vulnerabilities.