Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, key terminology, the difference between resilience and security, and the advantages of integrating cyber resilience. It then delves into risk management and the essential activities required to handle risks and leverage opportunities. Additionally, it highlights the importance of widely recognized management standards and best practice frameworks in achieving cyber resilience. The course further identifies the processes involved in cyber resilience, along with their control objectives, interactions, and activities that need to be aligned with relevant IT service management tasks. In its concluding section, the course details the segregation of duties and dual controls pertinent to roles and responsibilities within cyber resilience.
This course is available as onsite live training in United Arab Emirates or online live training.Course Outline
- Design and deliver cyber resilient strategies and services across your organization in line with your business needs
- Integrate cyber resilience into your existing systems and processes
- Establish a common language for cyber resilience across your organization
- Minimize the damage from a security breach and enable speedy response and recovery.
Requirements
- Basics of organization charts and employees roles
- Understanding the basics of cyber security
- It is recommended to attend the ITIL foundation before this course
Need help picking the right course?
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Testimonials (1)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Certified Chief Information Security Officer (CCISO)
35 HoursThe EC-Council’s CCISO Program has certified top-tier information security professionals globally. A select group of senior information security executives, known as the CCISO Advisory Board, played a pivotal role in establishing the program's foundation and defining the exam content, body of knowledge, and training materials. Various board members contributed in different capacities—as authors, exam writers, quality assurance reviewers, or trainers. Each aspect of the program was crafted with aspiring CISOs in mind, aiming to impart the expertise of seasoned professionals to the next generation in critical areas for developing and sustaining a robust information security program.
The Certified CISO (CCISO) program is pioneering in its approach to training and certifying high-level information security executives. Unlike other programs that focus solely on technical skills, CCISO emphasizes the application of information security management principles from an executive perspective. This program was developed by current CISOs for both existing and aspiring CISOs.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.
Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.
The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.
Goal:
The ultimate goal is to pass your CISA examination first time.
Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 HoursThe training is delivered through a workshop enriched with comprehensive knowledge based on the official CISA certificate framework. During the sessions, case studies will be analyzed to address specific issues. Classes will be conducted in English (upon request, also available in Polish) using the ISACA handbook in English.
CISA Exam Material Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Type: multiple choice test
Volume: 200 questions
List of requirements to claim the CISA qualification:
- Pass the CISA exam with a score of at least 450.
- Adhere to the ISACA Code of Professional Ethics.
- Pledge to follow the CISA Continuing Professional Education Policy.
- Achieve a minimum of five years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and meet these requirements, you can start your certification application: apply here
A fee of $50 is required for this application.
Additionally, there’s an annual maintenance fee to keep the certification active. The cost is $40 per year for ISACA members and $75 for non-members.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed for rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It covers all four domains of the latest ISACA CRISC syllabus with a strong emphasis on the examination itself. Attendees will receive the Official ISACA CRISC Review Manual and Question, Answer and Explanation (Q,A&E), which are invaluable for understanding the style of questions posed by ISACA and the type of answers they seek, thereby aiding in quick mastery of the material.
The technical skills and practices endorsed and assessed through the CRISC certification form the foundation for success in this field. Holding a CRISC certification showcases your expertise within the profession. With an increasing demand for professionals skilled in risk management and control, ISACA’s CRISC has become the preferred certification globally among both individuals and enterprises. This certification reflects a dedication to excellence in serving enterprises and advancing one's chosen career.
Objectives:
- To ensure you pass the CRISC examination on your first attempt.
- Possessing this certification will demonstrate your commitment to excelling in service to an enterprise.
- The rising demand for professionals with risk and control skills positions holders of this certification to secure better roles and salaries.
You will learn:
- To assist enterprises in achieving their business goals by creating, implementing, monitoring, and maintaining effective IS controls based on a risk-based approach.
- The technical competencies and practices promoted through CRISC, which are essential for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Information Systems Auditor
35 HoursDescription:
This course is the non-certifcation version of the "CISA - Certified Information Systems Auditor" course. CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Objectives:
- Use the knowledge gained to benefit your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Security Analyst
35 HoursTarget Audience in the UAE would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals
Securing Email with Cisco Email Security Appliance (SESA) v3.1
28 HoursThis class will help you:
- Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
- Gain leading-edge career skills focused on enterprise security
Objectives
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
Snyk
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced