Menu
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice

RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice

About
Prerequisites

None

Course Level

Basic

Description

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology.

The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

TOP »
Preferred Currency:
Offerings
Sort by Course TitleSort by Delivery MethodSort by Start DateSort by TypeSort by LocationDuration  Price 
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Virtual Classroom Apr 11, 2017Courses Online 18:00 (hr) USD $1450.00 See details
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Virtual Classroom Nov 06, 2017Courses Online 18:00 (hr) USD $1450.00 See details
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Traditional Classroom May 29, 2017Courses Canberra, Australia 3 (days) USD $2077.00 See details
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Traditional Classroom Jun 19, 2017Courses Frankfurt, Germany 3 (days) USD $1623.00 See details
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Traditional Classroom Jul 10, 2017Courses London, United Kingdom 3 (days) USD $1624.00 See details
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Traditional Classroom May 22, 2017Courses Singapore, Singapore 3 (days) USD $1691.00 See details
RESILIA™ Foundation - Introduction to Cyber Resilience Best Practice Traditional Classroom Sep 11, 2017Courses Singapore, Singapore 3 (days) USD $1691.00 See details
Who Should Attend

The RESILIA™ Foundation course audience includes all teams across the IT and Risk functions, including:

  • IT Service Management
  • Operations and Incident management
  • IT Change and Release management
  • IT Supplier and Vendor management
  • Business Analysis and Design
  • Business analysts
  • IT Architects
  • Development
  • IT Project and Program Management
  • Risk and Compliance
  • Information Security management
  • Business Continuity managers
Performance Focus

“This course, for the first time, brings together the cyber resilience best practices based on a process-based life cycle refined, improved, and tested over a quarter century to assure success.” - Moyn Uddin, Lead Author of the ITpreneurs RESILIA training program, and Author of the RESILIA™: Cyber Resilience Best Practice Guide from AXELOS.

Participants in this course learn about the methods and use of preventative, detective, and corrective controls allowing them to recognize risks and to operate effectively in a challenging environment. The course provides insights into common management standards and best practice frameworks that would assist in making decisions to anticipate, counter, and/or recover accordingly from cyber-attacks. Participants, upon completing this course, would be better positioned in an organization to effectively govern, manage, and comply with cyber resilience.

Examination

Syllabus scope: understand and recognize RESILIA™: Cyber Resilience Best Practice

  • Bloom’s level: 1-2
  • Format: multiple choice
  • Number of questions: 50
  • Duration: 100 minutes
  • Exam Format: closed-book exam
  • Proctoring: live or Web-proctored
What You Will Learn

Individuals certified at RESILIA™ Foundation will have demonstrated their knowledge of:

  • The purpose, benefits, and key terms of cyber resilience
  • Risk management and the key activities needed to address risks and opportunities
  • The purpose of a management system and how best practices and standards can contribute
  • Cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities
  • Cyber resilience design, the associated control objectives, and their interactions with ITSM activities
  • Cyber resilience transition, the associated control objectives, and their interactions with ITSM activities
  • Cyber resilience operation, the associated control objectives, and their interactions with ITSM activities
  • Cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities
  • The purpose and benefits of segregation of duties and dual controls
Course Overview

Introduction to Cyber Resilience

  • Describe what cyber resilience is
  • Identify the benefits of cyber resilience
  • Identify the terms
  • Identify the purpose of balancing
  • Identify the need for:
      • Confidentiality
      • Integrity
      • Availability
      • Authentication
      • Nonrepudiation

Risk Management

  • Describe risk management
  • Identify the purpose of risk management
  • Identify the terms: risk, asset, vulnerability, threat
  • Describe actions to address risks and opportunities:
  • Establish context
  • Establish criteria for risk assessment and acceptance
  • Risk identification
  • Risk analysis and evaluation
  • Risk treatment
  • Risk monitoring and review
  • Identify the terms:
  • Risk register
  • Risk avoidance
  • Risk modification
  • Risk sharing
  • Risk retention
  • Risk treatment plan
  • Defense-in-depth

Managing Cyber Resilience

  • Identify the purpose and scope of a management system
  • Identify the components of a management system
  • Recognize the relevance of common management standards and best practice frameworks to cyber resilience
  • Describe the difference between management, governance, and compliance

Cyber Resilience Strategy

  • Identify what cyber resilience strategy is intended to achieve
  • Identify cyber resilience activities that should be aligned with IT service strategy
  • Describe the purpose and key features of the control objectives
  • Identify interactions between the following ITSM processes and cyber resilience

Cyber Resilience Design

  • Identify what cyber resilience design is intended to achieve
  • Identify cyber resilience activities that should be aligned with IT service design
  • Describe the purpose and key features of the control objectives
  • Identify interactions between the following ITSM processes and cyber resilience

Cyber Resilience Transition

  • Identify what cyber resilience transition is intended to achieve
  • Describe the purpose and key features of the control objectives
  • Identify interactions between the following ITSM processes and cyber resilience

Cyber Resilience Operation

  • Identify what cyber resilience operation is intended to achieve
  • Describe the purpose and key features of the control objectives
  • Identify interactions between the following ITSM processes and cyber resilience

Cyber Resilience Continual Improvement

  • Identify what cyber resilience continual improvement is intended to achieve
  • Recognize maturity models and their purpose
  • Describe the purpose and key features of the control objectives
  • Describe how the seven-step improvement process can be used to plan cyber resilience improvements
  • Describe how to use the ITIL CSI approach to plan cyber resilience improvements

 Cyber Resilience Roles and Responsibilities

  • Describe segregation of duties and dual controls

Summary

  • What did we learn, and how can we implement this in our work environment?
Other Information

 1 RESILIA™ is a trade mark of AXELOS Limited, 

  All rights reserved. Material is reproduced under license from AXELOS

 

^  Back to top


International Institute for Learning, Inc.
110 East 59th Street, New York, NY 10022-1380 | USA Phone: 800-325-1533 or +1-212-758-0177 | Fax: +1-212-755-0777

Email Us | Terms and Conditions | Privacy Policy | Cancellation and Refund Policy | Careers | Sitemap | Login

PMI, PMBOK, PMP, CAPM, PgMP, PMI-RMP, PMI-PBA, PMI-ACP, the PMI Logo, the PMI Global Executive Council logo and the PMI Registered Education Provider Logo are marks of the Project Management Institute, Inc. PRINCE2®, PRINCE2 Agile®, ITIL®, IT Infrastructure Library®, M_o_R®, MSP®, P3O® and MoP® are registered trade marks of AXELOS Limited. RESILIA™ is a trade mark of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited. The PRINCE2, PRINCE2 Agile, ITIL, MSP, MoP, M_o_R, P3O and RESILIA Accredited Training Organization logos are trade marks of AXELOS Limited. APMG-International Change Management™, Managing Benefits™ and AgilePM™ are trade marks of The APM Group Limited. The APMG-International Agile Project Management, Change Management, Managing Benefits and Swirl Device logos are trademarks of The APM Group Limited. Microsoft® is a registered trademark of Microsoft Corporation in the United States and/or other countries. CBAP®, CCBA® and IIBA® are registered trademarks of International Institute of Business Analysis. BRMP® is a registered trademark of Business Relationship Management Institute, Inc.

© Copyright 2016. All rights reserved.