CLOSE
CLOSE
  • LOGIN
  • No products in the cart.

RESILIA Practitioner

CLASSROOM TRAINING

Our classroom training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.

CORPORATE TRAININGS

Our Corporate training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.

VIRTUAL TRAINING

Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning.

TRAINING HIGHLIGHTS

High quality training from Certified & Industry Experts

Earn 16 PDUs

Course Completion Certificates

Reimbursement guaranteed if the training is not satisfied

Extensive documentation provided

Our approach is both practical and inspirational. Our training is carefully designed and tested to develop the key skills and confidence needed while being highly participatory and fun

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology.

 

The RESILIA TM Practitioner course starts by revisiting the concepts and knowledge acquired in the Foundation course and requires you to bring that knowledge into practical activities in interesting real-life scenarios. The course begins with distinguishing among the terms: asset, risk, threat and vulnerability. It determines the key activities needed to address risks and opportunities as well as to create and manage a risk register and a risk treatment plan. Further, it explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. In the final part of the course, it describes the application of the seven-step improvement process to plan cyber resilience improvements, the ITIL CSI approach to cyber resilience and the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

Module 1 : Course Introduction

●      Let us get to know each other
●      Course learning objectives
●      Course agenda
●      Activities
●      Module end questions
●      Course book structure
●      RESILIA certification

Module 2 : Risk Management

●      Distinguish between the terms: risk, asset, vulnerability, threat
●      Determine the actions needed to address risks and opportunities and explain their purpose
●      Create and manage a:Risk register
●      Risk treatment plan

Module 3 : Cyber Resilience Strategy

●      Explain the purpose and use of the control objectives:Establish governance
●      Manage stakeholders
●      Identify and categorize stakeholders
●      Create and manage cyber resilience policies
●      Manage audit and compliance
●      Explain how ITSM processes and cyber resilience interact

Module 4 : Cyber Resilience Design

●      Explain the purpose and use of the control objectives:Human resource security
●      System acquisition, development, architecture and design
●      Supplier and 3rd party security
●      Endpoint security
●      Cryptography
●      Business continuity
●      Explain how ITSM processes and cyber resilience interact

Module 5 : Cyber Resilience Transition

●      Explain the purpose and use of the control objectives:Asset management and configuration management
●      Classification and handling
●      Data transportation and removable media
●      Change management
●      Testing
●      Training
●      Documentation management
●      Information retention
●      Information disposal
●      Explain how ITSM processes and cyber resilience interact

Module 6 : Cyber Resilience Operation

●      Explain the purpose and use of the control objectives:Access control
●      Network security management
●      Physical security
●      Operations security
●      Incident management
●      Explain how ITSM processes and cyber resilience interact

Module 7 : Cyber Resilience Continual Improvement

●      Explain the purpose and use of the control objectives:Audit and review
●      Control assessment
●      Key Performance Indicators
●      Business continuity improvements
●      Process improvements
●      Remediation and improvement planning
●      Apply the seven-step improvement process to plan cyber resilience improvements
●      Apply the ITIL CSI approach to cyber resilience

Module 8 : Segregation of Duties and Dual Controls

●      Apply the concepts of segregation of duties and dual controls to an organizational
●      Context
●      Be able to carry out risk management.
●      Be able to manage the controls relevant to cyber resilience strategy and align these with IT service management (ITSM).
●      Be able to manage the controls relevant to cyber resilience design and align these with ITSM.
●      Be able to manage the controls relevant to cyber resilience transition and align these with ITSM.
●      Be able to manage the controls relevant to cyber resilience operation and align these with ITSM.
●      Be able to manage the controls relevant to cyber resilience continual improvement and align these with ITSM.
●      Be able to evaluate need for segregation of duties and dual controls.

Day 1

●      Course Introduction
●      Risk Management
●      Cyber Resilience Strategy
●      Cyber Resilience Design

Day 2

●      Recap and discussion
●      Cyber Resilience Transition
●      Cyber Resilience Operation
●      Cyber Resilience Continual Improvement
●      Segregation of Duties and Dual Controls

The RESILIA TM Practitioner course audience includes all teams across the Business, IT and Risk functions, including:

 

●      IT Service Management
●      Operations and Incident management
●      IT Change & Release management
●      IT Supplier & Vendor management
●      Business Analysis and Design
●      Business analysts
●      IT Architects
●      Development
●      IT Project & Programme Management
●      Risk and Compliance
●      Information Security management
●      Business Continuity managers

What Does Mangates provide me on the day of the course?

We provide Course Materials, Course Completion Certificate and Refreshements

What experience does Instructor has?

All our Instructors are Certified & Industry Experts and they have years of experience in the same filed.

Do you provide a group discount for classroom training programs?

We do Provide Group Discounts such as 10% for group of 3, 15% for group of 5 and 20% for the group of 10 people.

If I cancel my Enrollment, how can I claim my Refund?

You can request a refund by sending an email to info@mangates.com and within 7 working days you get your money back.

Mangates.com © 2019 . All rights reserved.
ga('send', 'pageview');