Menu
RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice

RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice

About
Prerequisites

RESILIA™ Foundation Certification

Course Level

Basic

Description

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber-attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. 

The RESILIA™ Practitioner course starts by revisiting the concepts and knowledge acquired in the Foundation course and requires you to bring that knowledge into practical activities in interesting real-life scenarios. The course begins with distinguishing among the terms: asset, risk, threat, and vulnerability. It determines the key activities needed to address risks and opportunities as well as to create and manage a risk register and a risk treatment plan. Further, it explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. In the final part of the course, it describes the application of the seven-step improvement process to plan cyber resilience improvements, the ITIL CSI approach to cyber resilience, and the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

TOP »
Preferred Currency:
Offerings
Sort by Course TitleSort by Delivery MethodSort by Start DateSort by TypeSort by LocationDuration  Price 
RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice Traditional Classroom Jun 01, 2017Courses Canberra, Australia 2 (days) USD $1454.00 See details
RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice Traditional Classroom Jun 22, 2017Courses Frankfurt, Germany 2 (days) USD $1949.00 See details
RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice Traditional Classroom Jul 13, 2017Courses London, United Kingdom 2 (days) USD $1845.00 See details
RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice Traditional Classroom May 25, 2017Courses Singapore, Singapore 2 (days) USD $1338.00 See details
RESILIA™ Practitioner - Practical Application of Cyber Resilience Best Practice Traditional Classroom Sep 14, 2017Courses Singapore, Singapore 2 (days) USD $1338.00 See details
Who Should Attend

The RESILIA™ Practitioner course audience includes all teams across the Business, IT, and Risk functions, including:

  • IT Service Management
  • Operations and Incident management
  • IT Change and Release management
  • IT Supplier and Vendor management
  • Business Analysis and Design
  • Business analysts
  • IT Architects
  • Development
  • IT Project and Programme Management
  • Risk and Compliance
  • Information Security management
  • Business Continuity managers
Performance Focus

In this course, participants are exposed to various scenarios where they can apply their foundation-level knowledge and concepts of cyber resilience controls and procedures. This strategy will enable participants to manage and operate effectively in a challenging cyber-centric environment. The course takes into consideration the limitations of traditional security controls to combat today’s sophisticated cyber-attacks. This proactive approach to design and use new and effective controls along with industry compliance standards would assist in making decisions to prevent, detect, respond, and recover from today’s evolving cyber threats.

After completing this course, you will be well versed and highly equipped in an organization to govern, manage, and comply with cyber resilience.

Examination

  • Syllabus scope: understand and recognize RESILIA™: Cyber Resilience Best Practice
  • Bloom’s level: 3-4
  • Format: Multiple choice
  • Number of questions: 50
  • Duration: 135 minutes
  • Pass rate: 60%
  • Exam Format: closed-book exam
  • Proctoring: Live or Web-proctored
What You Will Learn

Individuals certified at this level will:

  • Be able to carry out risk management
  • Be able to manage the controls relevant to cyber resilience strategy and align these with IT service management (ITSM)
  • Be able to manage the controls relevant to cyber resilience design and align these with ITSM
  • Be able to manage the controls relevant to cyber resilience transition and align these with ITSM
  • Be able to manage the controls relevant to cyber resilience operation and align these with ITSM
  • Be able to manage the controls relevant to cyber resilience continual improvement and align these with ITSM
  • Be able to evaluate need for segregation of duties and dual controls
Course Overview

Course Introduction

  • Let us get to know each other
  • Course learning objectives
  • Course agenda
  • Activities
  • Module end questions
  • Course book structure
  • RESILIA certification

 Risk Management

  • Distinguish between the terms: risk, asset, vulnerability, threat
  • Determine the actions needed to address risks and opportunities and explain their purpose
  • Create and manage a:

a) Risk register

b) Risk treatment plan

Cyber Resilience Strategy

  • Explain the purpose and use of the control objectives:

a) Establish governance

b) Manage stakeholders

c) Identify and categorize stakeholders

d) Create and manage cyber resilience policies 

e) Manage audit and compliance

  • Explain how ITSM processes and cyber resilience interact

Cyber Resilience Design

  • Explain the purpose and use of the control objectives:

a) Human resource security

b) System acquisition, development, architecture, and design

c) Supplier and third-party security

d) Endpoint security

e) Cryptography

f)  Business continuity

  • Explain how ITSM processes and cyber resilience interact

Cyber Resilience Transition

  • Explain the purpose and use of the control objectives:

a) Asset management and configuration management

b) Classification and handling

c) Data transportation and removable media

d) Change management

e) Testing

f)  Training

g) Documentation management

h) Information retention

i)  Information disposal

  • Explain how ITSM processes and cyber resilience interact

Cyber Resilience Operation

  • Explain the purpose and use of the control objectives:

a) Access control

b) Network security management

c) Physical security

d) Operations security

e) Incident management

  • Explain how ITSM processes and cyber resilience interact

Cyber Resilience Continual Improvement

  • Explain the purpose and use of the control objectives:

a) Audit and review

b) Control assessment

c) Key Performance Indicators

d) Business continuity improvements

e) Process improvements

f)  Remediation and improvement planning

  • Apply the seven-step improvement process to plan cyber resilience improvements
  • Apply the ITIL CSI approach to cyber resilience

Segregation of Duties and Dual Controls

  • Apply the concepts of segregation of duties and dual controls to an organizational context

Summary

  • What did we learn, and how can we implement this in our work environment?
Other Information

RESILIA™ is a trade mark of AXELOS Limited,

All rights reserved. Material is reproduced under licence from AXELOS.

 

^  Back to top


International Institute for Learning, Inc.
110 East 59th Street, New York, NY 10022-1380 | USA Phone: 800-325-1533 or +1-212-758-0177 | Fax: +1-212-755-0777

Email Us | Terms and Conditions | Privacy Policy | Cancellation and Refund Policy | Careers | Sitemap | Login

PMI, PMBOK, PMP, CAPM, PgMP, PMI-RMP, PMI-PBA, PMI-ACP, the PMI Logo, the PMI Global Executive Council logo and the PMI Registered Education Provider Logo are marks of the Project Management Institute, Inc. PRINCE2®, PRINCE2 Agile®, ITIL®, IT Infrastructure Library®, M_o_R®, MSP®, P3O® and MoP® are registered trade marks of AXELOS Limited. RESILIA™ is a trade mark of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited. The PRINCE2, PRINCE2 Agile, ITIL, MSP, MoP, M_o_R, P3O and RESILIA Accredited Training Organization logos are trade marks of AXELOS Limited. APMG-International Change Management™, Managing Benefits™ and AgilePM™ are trade marks of The APM Group Limited. The APMG-International Agile Project Management, Change Management, Managing Benefits and Swirl Device logos are trademarks of The APM Group Limited. Microsoft® is a registered trademark of Microsoft Corporation in the United States and/or other countries. CBAP®, CCBA® and IIBA® are registered trademarks of International Institute of Business Analysis. BRMP® is a registered trademark of Business Relationship Management Institute, Inc.

© Copyright 2016. All rights reserved.