Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, defining key terminology, and clarifying the distinction between resilience and security, while highlighting the advantages of adopting cyber resilience. It provides an introduction to risk management and the essential activities required to address both risks and opportunities. The course further explores the importance of widely recognized management standards and best practice frameworks in achieving cyber resilience. It then identifies the specific cyber resilience processes, along with their associated control objectives, interactions, and activities, demonstrating how they align with relevant ITSM processes. In the concluding section, the course details the segregation of duties and dual controls pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in United Arab Emirates or online live training.Course Outline
- Design and deliver cyber resilient strategies and services across your organization in line with your business needs
- Integrate cyber resilience into your existing systems and processes
- Establish a common language for cyber resilience across your organization
- Minimize the damage from a security breach and enable speedy response and recovery.
Requirements
- Familiarity with organizational structures and employee roles
- Understanding of fundamental cyber security concepts
- It is recommended to complete the ITIL Foundation course prior to this one
Need help picking the right course?
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Testimonials (1)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Certified Chief Information Security Officer (CCISO)
35 HoursThe CCISO program by EC-Council has certified leading information security professionals globally. The CCISO Advisory Board, composed of high-level information security executives, laid the foundation for the program and defined the content for the exam, body of knowledge, and training. Board members contributed as authors, exam writers, quality assurance specialists, and trainers. The program was designed with aspiring CISOs in mind, aiming to transfer the expertise of seasoned professionals to the next generation in areas critical to developing and maintaining a successful information security program.
The Certified CISO (CCISO) program is the first of its kind, focusing on producing top-level information security executives. It emphasizes the application of information security management principles from an executive management perspective rather than solely technical knowledge. Developed by current CISOs for both current and aspiring CISOs, the program prepares leaders to drive organizational security strategy.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally recognized and most prestigious certification for professionals specializing in IS audit and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-oriented training program. Having successfully delivered over 150 CISA trainings in Europe and worldwide, and trained more than 1,200 delegates, Net Security’s in-house training material is designed with the primary objective of ensuring delegates pass the ISACA CISA® Exam. The methodology emphasizes a deep understanding of CISA IS auditing concepts and extensive practice with ISACA-released question banks from the last three years. CISA certification holders are in high demand among renowned accounting firms, global banks, advisory, assurance, and internal audit departments.
While delegates may possess years of IT auditing experience, their ability to solve CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is challenging because it often presents very similar options, testing your nuanced understanding of global IT auditing practices. To help candidates overcome these challenges, we provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual covers all exam-relevant concepts, case studies, and Q&A across the five CISA domains. Additionally, trainers provide key supporting materials such as relevant CISA notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps throughout the course.
Goal:
The ultimate goal is to help you pass your CISA examination on the first attempt.
Objectives:
- Apply gained knowledge practically to benefit your organization.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance regarding leadership, organizational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is delivered as an interactive workshop enriched with in-depth theoretical knowledge. The curriculum aligns with the official CISA certification framework. Throughout the sessions, we will analyze case studies to address specific challenges. Instruction is conducted in English (with Polish available upon request), utilizing the ISACA English-language handbook as the primary resource.
CISA Exam Content Domains:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice test
Number of Questions: 200
To qualify for the CISA certification, candidates must satisfy the following requirements:
- Successfully pass the CISA exam. A score of 450 or higher is required to pass.
- Adhere to the ISACA Code of Professional Ethics
- Commit to the CISA Continuing Professional Education Policy
- Acquire a minimum of 5 years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards
If you have passed the exam and believe you meet these criteria, you may begin your certification application via this certification page.
A processing fee of $50 applies to this application.
Additionally, an annual fee is required to maintain your certification after it has been awarded. The fee is $40 per year for ISACA members and $75 for non-members.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This intensive and rigorous course is designed specifically for exam preparation for ISACA’s Certified in Risk and Information Systems Control (CRISC) Examination. The training covers the latest four (4) domains of the ISACA CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the Official ISACA CRISC Review Manual and the Question, Answer and Explanation (Q&A&E) supplements. The Q&A&E resource is particularly valuable as it helps delegates understand the specific style of ISACA questions, the types of answers ISACA seeks, and aids in the rapid assimilation of the material.
The technical skills and practices promoted and evaluated by ISACA within the CRISC certification form the foundation for success in this profession. Holding the CRISC certification validates your expertise within the field. Given the increasing demand for professionals with risk and control expertise, ISACA’s CRISC has become the preferred certification for individuals and enterprises globally. The CRISC certification reflects a dedicated commitment to serving an enterprise and the chosen profession with distinction.
Objectives:
- Facilitate passing the CRISC examination on the first attempt.
- Demonstrate your commitment to serving an enterprise with distinction through this certification.
- Leverage the growing demand for professionals with risk and control skills to secure better positions and higher salaries.
You will learn:
- How to help enterprises achieve business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices promoted by CRISC, which serve as the building blocks for success in the industry.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in the UAE (available online or onsite) is designed for supply chain professionals who want to establish effective control and oversight of their supply chain, particularly regarding cybersecurity.
Upon completing this training, participants will be able to:
- Recognize security oversights that could cause significant damage and disruption to a supply chain.
- Decompose complex security challenges into manageable and actionable components.
- Address common supply chain vulnerabilities by analyzing high-risk areas and collaborating with stakeholders.
- Implement best practices for securing a supply chain.
- Significantly reduce or eliminate the most critical risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in the UAE (online or onsite) is designed for intermediate to advanced IT professionals and business leaders aiming to develop a structured approach to managing data breaches.
Upon completion of this training, participants will be able to:
- Grasp the causes and consequences of data breaches.
- Develop and implement strategies to prevent data breaches.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and evaluate the impact of breaches.
- Ensure compliance with legal and regulatory requirements for breach notification.
- Recover from data breaches and enhance security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Information Systems Auditor
35 HoursDescription:
This course represents the non-certification variant of the "CISA - Certified Information Systems Auditor" program. CISA® stands as the globally recognized and leading certification for professionals specializing in IS audit and IT risk consulting.
Objectives:
- Apply acquired knowledge to enhance organizational performance
- Deliver audit services aligned with IT audit standards
- Assure the effectiveness of leadership, organizational structures, and processes
- Assure the acquisition, development, testing, and implementation of IT assets
- Assure IT operations, including service delivery and third-party engagements
- Assure the organization’s security policies, standards, procedures, and controls effectively safeguard the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance and CPA professionals, IT specialists, internal and external auditors, and experts in information security and risk consulting.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led live training in the UAE (online or onsite) is targeted at security engineers who want to use IBM Qradar SIEM to address critical security use cases.
By the conclusion of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Business Continuity Practitioner (S-BCP)
35 HoursThis training course is essential for anyone aiming to develop into a Business Continuity Specialist. With this certification, you verify your knowledge of the Business Continuity Process and demonstrate to your organization that you can put theory into practice.
To obtain this certification, you attend the Business Continuity Practitioner training course at NobleProg. Subsequently, you book your exam with SECO.
Security Analyst
35 HoursThe target audience in the UAE includes network server administrators, firewall specialists, information security analysts, system administrators, and risk assessment professionals.
Snyk
14 HoursThis instructor-led, live training in the UAE (online or onsite) is designed for developers who want to integrate Snyk into their development tools to identify and resolve security issues in their code.
By the end of this training, participants will be able to:
- Grasp the features and structure of Snyk.
- Utilize Snyk to identify and resolve code security issues.
- Incorporate Snyk into the software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis program explores the fundamental principles of security and IT Security, focusing on strategies to defend against network-based threats. Attendees will develop a solid grasp of critical security protocols and the core concepts underpinning web services. The curriculum also examines recent exploits targeting cryptosystems and discusses associated vulnerabilities.