RESILIA Practitioner Training Course | Sydney, Melbourne, Brisbane & Perth

RESILIA Practitioner (Exam included)

loading..
(Course eligible for SATVs)

loading..

RESILIA™ Practitioner is an additional two-day course which equips individuals with practical skills to achieve the best balance of risk, cost, operational benefits and flexibility within an organisation.

It covers all aspects of Cyber Resilience, beginning with creating and managing a risk treatment plan, and then moving onto creating a cyber resilience strategy. Then, it explains design and how ITSM processes and cyber resilience interact. The next module explores the operational aspect of cyber resilience before finishing with continual business improvements.

RESILIA™ training is provided by Cobitism PTY LTD, a Peoplecert accredited Training Organisation. Copyright © Cobitism PTY LTD and AXELOS Limited 2018

  • Introduction to XYZ consulting and training case study
  • Distinguish between the terms: risk, asset, vulnerability, threat
  • Determine the actions needed to address risks and opportunities and explain their purpose
    • Establish context
    • Establish criteria for risk assessment and acceptance
    • Risk identification
    • Risk analysis and evaluation
    • Risk treatment
    • Risk monitoring and review
  • Create and manage a risk register
  • Create and manage a risk treatment plan

  • Explain the purpose and use of the control objectives
    • Establish governance
    • Manage stakeholders
    • Identify and categorise stakeholders
    • Create and manage cyber resilience policies
    • Manage audit and compliance
  • Explain how ITSM processes and cyber resilience interact
    (knowledge of the underlying ITSM processes will not be examined)
    • Strategy management for IT Services
    • Service portfolio management
    • Financial management for IT Services
    • Demand management
    • Business relationship management
    • Information risk management and risk treatment

  • Explain the purpose and key features of the control objectives:
    • Human resource security
    • System acquisition, development, architecture and design
    • Supplier and 3rd party security
    • Endpoint security
    • Cryptography
    • Business continuity
  • Explain how ITSM processes and cyber resilience interact:
    (knowledge of the underlying ITSM processes will not be examined)
    • Design co-ordination
    • Service catalogue management
    • Service level management
    • Availability management
    • Capacity management
    • IT service continuity management

  • Explain the purpose and use of the control objectives:
    • Asset management and configuration management
    • Classification and handling
    • Data transportation and removable media
    • Change management
    • Testing
    • Training
    • Documentation management
    • Information retention
    • Information disposal
  • Explain how ITSM processes and cyber resilience interact
    (knowledge of the underlying ITSM processes will not be examined)
    • Transition planning and support
    • Change management
    • Service asset and configuration management
    • Release and deployment management
    • Service validation and testing
    • Change evaluation
    • Knowledge management
    • Management of organisational change

  • Explain the purpose and use of the control objectives
    • Access control
    • Network security management
    • Physical security
    • Operations security
    • Incident management
  • Explain how ITSM processes and cyber resilience interact (knowledge of the underlying ITSM processes will not be examined)
    • Event management
    • Incident management
    • Request fulfilment
    • Problem management
    • Access management
    • Service desk
    • Technical management
    • Application management
    • IT operations management

  • Explain the purpose and use of the control objectives
    • Audit and review
    • Control assessment
    • Key Performance Indicators
    • Business continuity improvements
    • Process improvements
    • Remediation and improvement planning
  • Apply the seven-step improvement process to plan cyber resilience improvements
  • Apply the ITIL CSI approach to cyber resilience
  • Purpose and benefits of segregation of duties and dual controls
    • Segregation of Duties and Dual Control
    • Segregation of duties: development and operations
    • Roles and responsibilities, and separation of controls
    • What is meant by ‘dual control’?
    • Segregation of duties and cyber resilience

The RESILIA™ Practitioner course audience includes all teams across the IT and Risk functions, including:

  • IT Service Management
  • Operations and Incident management
  • IT Change & Release management
  • IT Supplier & Vendor management
  • Business analysts
  • IT Architects
  • IT Project & Programme Management
  • Information Security management

After completing this course, students will be able to:

Register

Traditional Classroom   

    Show all

    Traditional Classroom   

      Show all

      Traditional Classroom   

        Show all

        Traditional Classroom   

          Show all

          NextTech Live   

            Show all

            Flexible Mentored Learning   

              Show all

              Flexible Mentored Learning   

                Show all

                Flexible Mentored Learning   

                  Show all

                  Flexible Mentored Learning   

                    Show all

                    blah is false