AUCKLAND (09) 378-0411       HAMILTON (07) 838-0700       WELLINGTON (04) 472-4830      CHRISTCHURCH (03) 365-5020      |      
Home • Courses • RESILIA® Foundation

Courses


RESILIA® Foundation

Length: 3 Days    Cost: $2,500 + GST    Version: RESILIA

= Scheduled class    = Guaranteed to run    = Fully booked
Click on the dates to book online
CentreMarAprMayJun
Auckland--
08
15
----
Hamilton------
10
Christchurch----
06
--
Wellington--
01
--
24

Can't find a class in your area? Contact our sales team and request a class date.


About this Course

RESILIA Foundation demonstrates an understanding of Cyber Resilience Best Practices and of how decisions impact good/bad cyber resilience. This module teaches individuals how to make good cyber resilience an efficient part of business and operational management and shows how nurturing cyber resilience can support operational effectiveness and organisational resilience.

RESILIA Foundation introduces the key terms and benefits associated with cyber resilience, enabling individuals to demonstrate they understand and recognise best practice and know how to manage and address cyber risks.



Audience


RESILIA Foundation is aimed at professionals responsible for IT and security functions or risk and compliance operations within an organization. It is also beneficial to professionals in HR, Procurement, Operations and Marketing who need to have resilience expertise within their teams.

Prerequisites

There are no prerequisites for this course thus anyone can attend.

Course Outline


Module 1: Intro to Cyber Resilience

• Describe what cyber resilience is

• Identify the benefits of cyber resilience

• Identify the terms

• Identify the purpose of balancing

• Identify the need for:

• Confidentiality

• Integrity

• Availability

• Authentication

• Nonrepudiation

Module 2: Risk management

• Describe what risk management is

• Identify the purpose of risk management

• Identify the terms: risk, asset, vulnerability, threat

• Describe actions to address risks and opportunities:

• Establish context

• Establish criteria for risk assessment and acceptance

• Risk identification

• Risk analysis and evaluation

• Risk treatment

• Risk monitoring and review

• Identify the terms:

• Risk register

• Risk avoidance

• Risk modification

• Risk sharing

• Risk retention

• Risk treatment plan

• Defence-in-depth

Module 3: Managing Cyber Resilience

• Identify the purpose and scope of a management system

• Identify the components of a management system

• Recognize the relevance of common management standards and best practice frameworks to cyber resilience

• Describe the difference between management, governance, and compliance

Module 4: Cyber Resilience Strategy

• Identify what cyber resilience strategy is intended to achieve

• Identify cyber resilience activities that should be aligned with IT service strategy

• Describe the purpose and key features of the control objectives

• Identify interactions between the following IT service management processes and cyber resilience

Module 5: Cyber Resilience Design

• Identify what cyber resilience design is intended to achieve

• Identify cyber resilience activities that should be aligned with IT service design

• Describe the purpose and key features of the control objectives

• Identify interactions between the following IT service management processes and cyber resilience

Module 6: Cyber Resilience Transition

• Identify what cyber resilience transition is intended to achieve

• Describe the purpose and key features of the control objectives

• Identify interactions between the following IT service management processes and cyber resilience

Module 7: Cyber Resilience Operation

• Identify what cyber resilience operation is intended to achieve

• Describe the purpose and key features of the control objectives

• Identify interactions between the following IT service management processes and cyber resilience

Module 8: Cyber Resilience Continual Improvement

• Identify what cyber resilience continual improvement is intended to achieve

• Recognize maturity models and their purpose

• Describe the purpose and key features of the control objectives

• Describe how the seven-step improvement process can be used to plan cyber resilience improvements

• Describe how to use ITIL CSI approach to plan cyber resilience improvements

Module 9: Cyber Resilience Roles & responsibilities

• Describe segregation of duties and dual controls


 Print this page