Resilia - Cyber Security Foundation
Course Description
As the range and complexity of cyber threats and vulnerabilities has increased, the approach to managing the associated risks has also evolved and matured. RESILIA is a complete, collaborative risk-based approach driven by the Board but involving everyone across the organisation and extending to partners, supply chain and customers. It requires moving away from strategies that seek solely to protect the business to an approach that includes preparing for, and recovering from, a cyber-attack.
3 days
Contact us for pricing
Prerequisites
Upon completion of the training and examination related to this qualification, a successful candidate will be familiar with the: General understanding of cyber resilience Purpose of risk management and how to do it Purpose of each lifecycle stage Key features of each control Interactions between cyber resilience and ITSMObjectives
Describe what cyber resilience is Identify the benefits Identify terms What is the purpose of balancing: Preventative detective, and corrective controls People, process, technology Risks and opportunities Identify the need for: Confidentiality Integrity Availability Authentication NonrepudiationIntroduction to Cyber Resilience
Describe what risk management is Identify the purpose Identify terms Describe actions to address risks and opportunitiesRisk Management
Identify the purpose and scope of a management system Identify the components of a management system Recognize the relevance of common management standards and best practice frameworks to cyber resilience Describe the difference between management, governance and complianceManaging Cyber Resilience
Identify what cyber resilience strategy is intended to achieve Identify cyber resilience activities that should be aligned with IT service strategy Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilienceCyber Resilience Strategy
Identify what cyber resilience design is intended to achieve Identify cyber resilience activities that should be aligned with IT service design Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilienceCyber Resilience Design
Identify what cyber resilience transition is intended to achieve Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilienceCyber Resilience Transition
Identify what cyber resilience operation is intended to achieve Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilienceCyber Resilience Operation
Identify what cyber resilience continual improvement is intended to achieve Recognise maturity models and their purpose Describe the purpose and key features of the control objectives Describe how the seven-step improvement process can be used to plan cyber resilience improvements Describe how to use ITIL CSI approach to plan cyber resilience improvementsCyber Resilience Continual Improvement
Describe segregation of duties and dual controlsResiliaSecurityCyber SecurityCybersecurityResiliaCSF