Realdolmen Education

Details

Resilia Practitioner

This course is currently not scheduled on the open calendar, but can be organized on request.

Request Course

Duration

2 day(s)

Audience

The RESILIA (TM) Practitioner course audience includes all teams across the Business, IT and Risk functions: IT Service Management, Business Analysis and Design, Development, IT Project & Program Management, Risk and Compliance.

Prerequisites

RESILIA (TM) Foundation Certification.

Objectives

Individuals certified at this level will be able to carry out risk management, to be able to manage the controls relevant to cyber resilience strategy and align these with IT service management (ITSM), to be able to manage the controls relevant to cyber resilience design and align these with ITSM, to be able to manage the controls relevant to cyber resilience transition and align these with ITSM, to be able to manage the controls relevant to cyber resilience operation and align these with ITSM, to be able to manage the controls relevant to cyber resilience continual improvement and align these with ITSM, to be able to evaluate need for segregation of duties and dual controls.

Methods

Classroom training

Description

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology.

The RESILIA (TM) Practitioner course starts by revisiting the concepts and knowledge acquired in the Foundation course and requires you to bring that knowledge into practical activities in interesting real-life scenarios. The course begins with distinguishing among the terms: asset, risk, threat and vulnerability. It determines the key activities needed to address risks and opportunities as well as to create and manage a risk register and a risk treatment plan. Further, it explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. In the final part of the course, it describes the application of the seven-step improvement process to plan cyber resilience improvements, the ITIL CSI approach to cyber resilience and the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

Contents

  • Module 1: Course Introduction
  • Module 2: Risk Management
    • Distinguish between the terms: risk, asset, vulnerability, threat
    • Determine the actions needed to address risks and opportunities and explain their
    • Create and manage a Risk register and a Risk treatment plan
  • Module 3: Cyber Resilience Strategy
    • Explain the purpose and use of the control objectives
    • Explain how ITSM processes and cyber resilience interact
  • Module 4: Cyber Resilience Design
    • Explain the purpose and use of the control objectives
    • Explain how ITSM processes and cyber resilience interact
  • Module 5: Cyber Resilience Transition
    • Explain the purpose and use of the control objectives
    • Explain how ITSM processes and cyber resilience interact
  • Module 6: Cyber Resilience Operation
    • Explain the purpose and use of the control objectives
    • Explain how ITSM processes and cyber resilience interact
  • Module 7: Cyber Resilience Continual Improvement
    • Explain the purpose and use of the control objectives
    • Apply the seven-step improvement process to plan cyber resilience improvements
    • Apply the ITIL CSI approach to cyber resilience
  • Module 8: Segregation of Duties and Dual Controls
    • Apply the concepts of segregation of duties and dual controls to an organizational