Resilia - Cyber Security Foundation

This course has been superseded

Try searching for alternatives

Course Description

As the range and complexity of cyber threats and vulnerabilities has increased, the approach to managing the associated risks has also evolved and matured. RESILIA is a complete, collaborative risk-based approach driven by the Board but involving everyone across the organisation and extending to partners, supply chain and customers. It requires moving away from strategies that seek solely to protect the business to an approach that includes preparing for, and recovering from, a cyber-attack.
3 days
Contact us for pricing
 

Prerequisites

Upon completion of the training and examination related to this qualification, a successful candidate will be familiar with the: General understanding of cyber resilience Purpose of risk management and how to do it Purpose of each lifecycle stage Key features of each control Interactions between cyber resilience and ITSM

Objectives

Describe what cyber resilience is Identify the benefits Identify terms What is the purpose of balancing: Preventative detective, and corrective controls People, process, technology Risks and opportunities Identify the need for: Confidentiality Integrity Availability Authentication Nonrepudiation

Introduction to Cyber Resilience

Describe what risk management is Identify the purpose Identify terms Describe actions to address risks and opportunities

Risk Management

Identify the purpose and scope of a management system Identify the components of a management system Recognize the relevance of common management standards and best practice frameworks to cyber resilience Describe the difference between management, governance and compliance

Managing Cyber Resilience

Identify what cyber resilience strategy is intended to achieve Identify cyber resilience activities that should be aligned with IT service strategy Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilience

Cyber Resilience Strategy

Identify what cyber resilience design is intended to achieve Identify cyber resilience activities that should be aligned with IT service design Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilience

Cyber Resilience Design

Identify what cyber resilience transition is intended to achieve Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilience

Cyber Resilience Transition

Identify what cyber resilience operation is intended to achieve Describe the purpose and key features of the control objectives Identify interactions between ITSM processes and cyber resilience

Cyber Resilience Operation

Identify what cyber resilience continual improvement is intended to achieve Recognise maturity models and their purpose Describe the purpose and key features of the control objectives Describe how the seven-step improvement process can be used to plan cyber resilience improvements Describe how to use ITIL CSI approach to plan cyber resilience improvements

Cyber Resilience Continual Improvement

Describe segregation of duties and dual controls

ResiliaSecurityCyber SecurityCybersecurityResiliaCSF