RESILIA Foundation Training Course | Sydney, Melbourne, Brisbane & Perth

RESILIA Foundation (Exam included)

loading..
(Course eligible for SATVs)

loading..

The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

RESILIA™ training is provided by Cobitism PTY LTD, a Peoplecert accredited Training Organisation. Copyright © Cobitism PTY LTD and AXELOS Limited 2018

  • Describe what cyber resilience is
  • Identify the benefits of cyber resilience

  • Describe what risk management is
  • Identify the purpose of risk management
  • Identify the terms: risk, asset, vulnerability, threat

  • Purpose of a management system and how best practices and standards can contribute
  • Purpose and scope of a management system
  • Components of a management system
  • Common management standards and best practice frameworks to cyber resilience
  • Best practice frameworks to cyber resilience, ITIL, ISO/IEC 27001, NIST Framework
  • Difference between management, governance & compliance

  • Identify what cyber resilience strategy is intended to achieve
  • Identify cyber resilience activities that should be aligned with IT service strategy

  • What cyber resilience design is intended to achieve
  • Cyber resilience aligned with IT service design

  • Understand the purpose of cyber resilience transition, the associated control objectives and their interactions with ITSM activities
  • What cyber resilience transition is intended to achieve

  • Understand the purpose of cyber resilience operation, the associated control objectives and their interactions with ITSM activities
  • What cyber resilience operation is intended to achieve

  • Identify what cyber resilience continual improvement is intended to achieve
  • Recognise maturity models and their purpose

  • Purpose and benefits of segregation of duties and dual controls

The RESILIA™ Foundation course audience includes all teams across the IT and Risk functions, including:

  • IT Service Management
  • Operations and Incident management
  • IT Change & Release management
  • IT Supplier & Vendor management
  • Business analysts
  • IT Architects
  • IT Project & Programme Management
  • Information Security management

Before attending this course, students must have:

Key Participants Benefit

Participants to this course learn about the methods and use of preventative, detective, and corrective controls allowing them to recognize risks and to operate effectively in a challenging environment. The course provides insights into common management standards and best practice frameworks that would assist in making decisions to anticipate, counter and/or recover accordingly from cyber-attacks. Participants on completing this course would be better positioned in an organisation to effectively govern, manage and comply with cyber resilience.

After completing this course, students will be able to:

Register

Traditional Classroom   

    Show all

    Traditional Classroom   

      Show all

      Traditional Classroom   

        Show all

        Traditional Classroom   

          Show all

          NextTech Live   

            Show all

            Flexible Mentored Learning   

              Show all

              Flexible Mentored Learning   

                Show all

                Flexible Mentored Learning   

                  Show all

                  Flexible Mentored Learning   

                    Show all

                    blah is false