Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, key terminology, the difference between resilience and security, and the advantages of integrating cyber resilience. It then delves into risk management and the essential activities required to handle risks and leverage opportunities. Additionally, it highlights the importance of widely recognized management standards and best practice frameworks in achieving cyber resilience. The course further identifies the processes involved in cyber resilience, along with their control objectives, interactions, and activities that need to be aligned with relevant IT service management tasks. In its concluding section, the course details the segregation of duties and dual controls pertinent to roles and responsibilities within cyber resilience.
This course is available as onsite live training in United Arab Emirates or online live training.Course Outline
- Design and deliver cyber resilient strategies and services across your organization in line with your business needs
- Integrate cyber resilience into your existing systems and processes
- Establish a common language for cyber resilience across your organization
- Minimize the damage from a security breach and enable speedy response and recovery.
Requirements
- Basics of organization charts and employees roles
- Understanding the basics of cyber security
- It is recommended to attend the ITIL foundation before this course
Need help picking the right course?
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Testimonials (1)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Certified Chief Information Security Officer (CCISO)
35 HoursThe EC-Council’s CCISO Program has certified top-tier information security professionals globally. A select group of senior information security executives, known as the CCISO Advisory Board, played a pivotal role in establishing the program's foundation and defining the exam content, body of knowledge, and training materials. Various board members contributed in different capacities—as authors, exam writers, quality assurance reviewers, or trainers. Each aspect of the program was crafted with aspiring CISOs in mind, aiming to impart the expertise of seasoned professionals to the next generation in critical areas for developing and sustaining a robust information security program.
The Certified CISO (CCISO) program is pioneering in its approach to training and certifying high-level information security executives. Unlike other programs that focus solely on technical skills, CCISO emphasizes the application of information security management principles from an executive perspective. This program was developed by current CISOs for both existing and aspiring CISOs.
CISA - Certified Information Systems Auditor
28 HoursDescription:
The CISA® certification is globally recognized as the most sought-after credential for professionals in IS auditing and IT risk consultancy.
Our CISA course is rigorous, competitive, and exam-focused. With over 150+ training sessions conducted across Europe and worldwide, and more than 1200+ delegates trained, Net Security's CISA materials are developed internally with the primary aim of ensuring that participants pass the ISACA CISA® Exam. The training approach emphasizes understanding CISA auditing concepts and practicing numerous question banks released by ISACA over the past three years. Over time, CISA holders have been highly sought after by leading accounting firms, global banks, advisory services, assurance teams, and internal audit departments.
Even with extensive experience in IT auditing, delegates' ability to tackle CISA questions will depend on their grasp of internationally accepted IT assurance practices. The exam is challenging due to the potential for closely competing answer choices, which tests candidates’ understanding of global IT auditing standards. To meet these challenges, we provide experienced trainers who have a proven track record in delivering CISA training globally.
The Net Security CISA manual encompasses all relevant concepts, case studies, and Q&A across the five CISA domains. Additionally, the trainer provides key supporting materials such as notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps throughout the course.
Goal:
The primary objective is to successfully pass your CISA examination on the first attempt.
Objectives:
- Apply acquired knowledge in practical ways that benefit your organization
- Conduct audit services according to IT auditing standards
- Ensure assurance on leadership and organizational structure and processes
- Provide assurance on the acquisition, development, testing, and implementation of IT assets
- Offer assurance on IT operations including service operations and third-party engagements
- Guarantee the confidentiality, integrity, and availability of information assets through assurance on security policies, standards, procedures, and controls.
Target Audience:
This course is designed for finance/CPA professionals, IT specialists, internal & external auditors, information security experts, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 HoursThe training is delivered through a workshop enriched with comprehensive knowledge based on the official CISA certificate framework. During the sessions, case studies will be analyzed to address specific issues. Classes will be conducted in English (upon request, also available in Polish) using the ISACA handbook in English.
CISA Exam Material Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Type: multiple choice test
Volume: 200 questions
List of requirements to claim the CISA qualification:
- Pass the CISA exam with a score of at least 450.
- Adhere to the ISACA Code of Professional Ethics.
- Pledge to follow the CISA Continuing Professional Education Policy.
- Achieve a minimum of five years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and meet these requirements, you can start your certification application: apply here
A fee of $50 is required for this application.
Additionally, there’s an annual maintenance fee to keep the certification active. The cost is $40 per year for ISACA members and $75 for non-members.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed for rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It covers all four domains of the latest ISACA CRISC syllabus with a strong emphasis on the examination itself. Attendees will receive the Official ISACA CRISC Review Manual and Question, Answer and Explanation (Q,A&E), which are invaluable for understanding the style of questions posed by ISACA and the type of answers they seek, thereby aiding in quick mastery of the material.
The technical skills and practices endorsed and assessed through the CRISC certification form the foundation for success in this field. Holding a CRISC certification showcases your expertise within the profession. With an increasing demand for professionals skilled in risk management and control, ISACA’s CRISC has become the preferred certification globally among both individuals and enterprises. This certification reflects a dedication to excellence in serving enterprises and advancing one's chosen career.
Objectives:
- To ensure you pass the CRISC examination on your first attempt.
- Possessing this certification will demonstrate your commitment to excelling in service to an enterprise.
- The rising demand for professionals with risk and control skills positions holders of this certification to secure better roles and salaries.
You will learn:
- To assist enterprises in achieving their business goals by creating, implementing, monitoring, and maintaining effective IS controls based on a risk-based approach.
- The technical competencies and practices promoted through CRISC, which are essential for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Information Systems Auditor
35 HoursDescription:
This course serves as the non-certification variant of the "CISA - Certified Information Systems Auditor" program. CISA® is globally recognized and widely sought after by professionals engaged in IS auditing and IT risk consulting.
Objectives:
- Leverage acquired knowledge to enhance your organization's performance
- Deliver audit services that adhere to IT audit standards
- Ensure leadership, organizational structure, and processes are audited effectively
- Offer assurance on the acquisition, development, testing, and implementation of IT assets
- Provide oversight for IT operations, including service management and third-party engagements
- Assure that the organization's security policies, standards, procedures, and controls safeguard the confidentiality, integrity, and availability of information assets.
Target Audience:
The course is designed for finance/CPA professionals, IT specialists, internal and external auditors, information security experts, and risk consulting practitioners.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Security Analyst
35 HoursTarget Audience in the UAE would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals
Securing Email with Cisco Email Security Appliance (SESA) v3.1
28 HoursThis class will help you:
- Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
- Gain leading-edge career skills focused on enterprise security
Objectives
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
Snyk
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course delves into fundamental security principles and IT security, focusing particularly on safeguarding networks from attacks. Attendees will acquire knowledge of crucial security protocols and the security aspects of web services. The curriculum也将提及针对加密系统的最近攻击及一些相关漏洞。 Note: The last sentence seems to be a mix of English and Chinese. Here is the fully English version:
This course delves into fundamental security principles and IT security, focusing particularly on safeguarding networks from attacks. Attendees will acquire knowledge of crucial security protocols and the security aspects of web services. The curriculum will also reference recent attacks on cryptosystems and some related vulnerabilities.