RESILIA Foundation and Practitioner Package | Sydney, Melbourne, Brisbane & Perth

RESILIA Foundation and Practitioner Package (Exams included)

loading..
(Course eligible for SATVs)

loading..

The RESILIA™ Foundation and Practitioner Package combines NextTech two RESILIA™ courses into one.

The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

RESILIA™ Practitioner is an additional two-day course which equips individuals with practical skills to achieve the best balance of risk, cost, operational benefits and flexibility within an organisation. It covers all aspects of Cyber Resilience, beginning with creating and managing a risk treatment plan, and then moving onto creating a cyber resilience strategy. Then, it explains design and how ITSM processes and cyber resilience interact. The next module explores the operational aspect of cyber resilience before finishing with continual business improvements.

RESILIA™ training is provided by Cobitism PTY LTD, a Peoplecert accredited Training Organisation. Copyright © Cobitism PTY LTD and AXELOS Limited 2018

  • Describe what cyber resilience is
  • Identify the benefits of cyber resilience

  • Describe what risk management is
  • Identify the purpose of risk management
  • Identify the terms: risk, asset, vulnerability, threat

  • Purpose of a management system and how best practices and standards can contribute
  • Purpose and scope of a management system
  • Components of a management system
  • Common management standards and best practice frameworks to cyber resilience
  • Best practice frameworks to cyber resilience, ITIL, ISO/IEC 27001, NIST Framework
  • Difference between management, governance & compliance

  • Identify what cyber resilience strategy is intended to achieve
  • Identify cyber resilience activities that should be aligned with IT service strategy

  • What cyber resilience design is intended to achieve
  • Cyber resilience aligned with IT service design

  • Understand the purpose of cyber resilience transition, the associated control objectives and their interactions with ITSM activities
  • What cyber resilience transition is intended to achieve

  • Understand the purpose of cyber resilience operation, the associated control objectives and their interactions with ITSM activities
  • What cyber resilience operation is intended to achieve

  • Identify what cyber resilience continual improvement is intended to achieve
  • Recognise maturity models and their purpose

  • Purpose and benefits of segregation of duties and dual controls

  • Introduction to XYZ consulting and training case study
  • Distinguish between the terms: risk, asset, vulnerability, threat
  • Determine the actions needed to address risks and opportunities and explain their purpose
  • Establish context
  • Establish criteria for risk assessment and acceptance
  • Risk identification
  • Risk analysis and evaluation
  • Risk treatment
  • Risk monitoring and review
  • Create and manage a risk register
  • Create and manage a risk treatment plan

  • Explain the purpose and use of the control objectives
  • Establish governance
  • Manage stakeholders
  • Identify and categorise stakeholders
  • Create and manage cyber resilience policies
  • Manage audit and compliance
  • Explain how ITSM processes and cyber resilience interact(knowledge of the underlying ITSM processes will not be examined)
  • Strategy management for IT Services
  • Service portfolio management
  • Financial management for IT Services
  • Demand management
  • Business relationship management
  • Information risk management and risk treatment

  • Explain the purpose and key features of the control objectives:
  • Human resource security
  • System acquisition, development, architecture and design
  • Supplier and 3rd party security
  • Endpoint security
  • Cryptography
  • Business continuity
  • Explain how ITSM processes and cyber resilience interact:(knowledge of the underlying ITSM processes will not be examined)
  • Design co-ordination
  • Service catalogue management
  • Service level management
  • Availability management
  • Capacity management
  • IT service continuity management

  • Explain the purpose and use of the control objectives:
  • Asset management and configuration management
  • Classification and handling
  • Data transportation and removable media
  • Change management
  • Testing
  • Training
  • Documentation management
  • Information retention
  • Information disposal
  • Explain how ITSM processes and cyber resilience interact(knowledge of the underlying ITSM processes will not be examined)
  • Transition planning and support
  • Change management
  • Service asset and configuration management
  • Release and deployment management
  • Service validation and testing
  • Change evaluation
  • Knowledge management
  • Management of organisational change

  • Explain the purpose and use of the control objectives
  • Access control
  • Network security management
  • Physical security
  • Operations security
  • Incident management
  • Explain how ITSM processes and cyber resilience interact (knowledge of the underlying ITSM processes will not be examined)
  • Event management
  • Incident management
  • Request fulfilment
  • Problem management
  • Access management
  • Service desk
  • Technical management
  • Application management
  • IT operations management

  • Explain the purpose and use of the control objectives
  • Audit and review
  • Control assessment
  • Key Performance Indicators
  • Business continuity improvements
  • Process improvements
  • Remediation and improvement planning
  • Apply the seven-step improvement process to plan cyber resilience improvements
  • Apply the ITIL CSI approach to cyber resilience
  • Purpose and benefits of segregation of duties and dual controls
  • Segregation of Duties and Dual Control
  • Segregation of duties: development and operations
  • Roles and responsibilities, and separation of controls
  • What is meant by ‘dual control’?
  • Segregation of duties and cyber resilience

The RESILIA™ Foundation course audience includes all teams across the IT and Risk functions, including:

  • IT Service Management
  • Operations and Incident management
  • IT Change & Release management
  • IT Supplier & Vendor management
  • Business analysts
  • IT Architects
  • IT Project & Programme Management
  • Information Security management

Before attending this course, students must have:

Key Participants Benefit

Participants to this course learn about the methods and use of preventative, detective, and corrective controls allowing them to recognize risks and to operate effectively in a challenging environment. The course provides insights into common management standards and best practice frameworks that would assist in making decisions to anticipate, counter and/or recover accordingly from cyber-attacks. Participants on completing this course would be better positioned in an organisation to effectively govern, manage and comply with cyber resilience.

After completing this course, students will be able to:

Register

Traditional Classroom   

    Show all

    Traditional Classroom   

      Show all

      Traditional Classroom   

        Show all

        Traditional Classroom   

          Show all

          NextTech Live   

            Show all

            Flexible Mentored Learning   

              Show all

              Flexible Mentored Learning   

                Show all

                Flexible Mentored Learning   

                  Show all

                  Flexible Mentored Learning   

                    Show all

                    blah is false