Realdolmen Education

Details

Resilia Foundation

This course is currently not scheduled on the open calendar, but can be organized on request.

Request Course

Duration

3 day(s)

Audience

The RESILIATM Foundation course audience includes all teams across the IT and Risk functions: IT Service Management, Business Analysis and Design, Development, IT Project & Program Management, Risk and Compliance.

Prerequisites

There are no prerequisites for this course.

Objectives

Individuals certified at RESILIATM Foundation will have demonstrated their knowledge of, the purpose, benefits, and key terms of cyber resilience, Risk management and the key activities needed to address risks and opportunities, the purpose of a management system and how best practices and standards can contribute, cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities, cyber resilience design, the associated control objectives and their interactions with ITSM activities, cyber resilience transition, the associated control objectives, and their interactions with ITSM activities, cyber resilience operation, the associated control objectives, and their interactions with ITSM activities, cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities, and the purpose and benefits of segregation of duties and dual controls.

Methods

Classroom Training

Description

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology.

The RESILIATM Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

Contents

  • Module 1: Course Introduction
    • Course Learning Objectives
    • Course Agenda
    • Activities
    • Module End Questions
    • Course Book Structure
    • RESILIA Certification
  • Module 2: Introduction to Cyber Resilience
    • What is Cyber Resilience?
    • Module Learning Objectives
    • Module Topics
    • Defining Cyber Resilience
    • Balancing in Cyber Resilience
    • Characteristics of Cyber Resilience
  • Module 3: Risk management
    • Understanding Risk Management: Discussion
    • Module Learning Objectives
    • Module Topics
    • Defining Risk Management
    • Addressing Risks and Opportunities
  • Module 4: Managing Cyber Resilience
    • Why and What of Management Systems?
    • Module Learning Objectives
    • Module Topics
    • Management Systems
    • Common Management Standards and Frameworks
  • Module 5: Cyber Resilience Strategy
    • What is Strategy?
    • Module Learning Objectives
    • Module Topics
    • Cyber Resilience Strategy and Activities
    • Security Controls at Cyber Resilience Strategy
    • Interaction Between ITSM Processes and Cyber Resilience
  • Module 6: Cyber Resilience Design
    • Why Cyber Resilience Design?
    • Module Learning Objectives
    • Module TopicsCyber Resilience Design Activities
    • Security Controls at Cyber Resilience Design
    • Aligning ITSM Processes with Cyber Resilience Processes
  • Module 7: Cyber Resilience Transition
    • Why Cyber Resilience Transition?
    • Module Learning Objective
    • Module Topics
    • Basics of Cyber Resilience Transition
    • Cyber Resilience Transition: Controls
    • Interaction Between ITSM Processes and Cyber Resilience
  • Module 8: Cyber Resilience Operation
    • The Purpose of Cyber Resilience Operation
    • Module Learning Objectives
    • Module Topics
    • Security Controls in Cyber Resilience Operation
    • Interaction Between IT Processes and Cyber Resilience
    • Interaction Between ITSM Functions and Cyber Resilience
  • Module 9: Cyber Resilience Continual Improvement
    • Continual or Continuous Improvement
    • Module Learning Objectives
    • Module Topics
    • Maturity
    • Continual Improvement Controls
    • The Seven-Step Improvement Process
    • The ITIL CSI Approach
  • Module 10: Cyber Resilience Roles & responsibilities
    • Module Learning Objectives
    • Module Topics
    • Segregating Duties
    • Dual Controls
  • Module 11: Exam Preparation Guide
    • Module Learning Objectives
    • Topics Covered in This Module