Best Management Practice Training and Consultancy

RESILIA™ Practitioner

Training Course in London

Includes exam and manual.
Pre-requisite: RESILIA Foundation

Please Select Date

Summary

The purpose of the practitioner qualification is to understand what effective cyber resilience looks like and what the risks and issues that can easily hit cyber resilience. Individuals will understand how to get the best balance of risk, cost, benefits and flexibility within an organization.

 

Target group

The qualification is aimed at professionals within the IT and security functions; risk and compliance functions. Other core business functions including HR, Finance, Procurement, Operations and Marketing, will also benefit from having cyber resilience expertise within the team, often including a local champion or mentor for all staff to refer to.

 

Context

The RESILIA qualifications have been developed to offer two levels of qualification: Foundation and Practitioner.

 

Exam content

  1. Be able to carry out risk management
  2. Be able to manage the controls relevant to cyber resilience strategy and align these with IT service management (ITSM)
  3. Be able to manage the controls relevant to cyber resilience design and align these with ITSM
  4. Be able to manage the controls relevant to cyber resilience transition and align these with ITSM
  5. Be able to manage the controls relevant to cyber resilience operation and align these with ITSM
  6. Be able to manage the controls relevant to cyber resilience continual improvement and align these with ITSM
  7. Be able to evaluate need for segregation of duties and dual controls

 

Prerequisites

  • passed the Foundation examination
  • followed an accredited training

 

Exam Details

Number of questions: 50

Pass mark: 60% (30 out of 50)

Open book: no

Electronic devices permitted: no

Course Description

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL®  and PRINCE2®,  brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology.


The RESILIA Practitioner course starts by revisiting the concepts and knowledge acquired in the Foundation course and requires you to bring that knowledge into practical activities in interesting real-life scenarios. The course begins with distinguishing among the terms: asset, risk, threat and vulnerability. It determines the key activities needed to address risks and opportunities as well as to create and manage a risk register and a risk treatment plan. Further, it explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. In the final part of the course, it describes the application of the seven-step improvement process to plan cyber resilience improvements, the ITIL CSI approach to cyber resilience and the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

Audience

The RESILIA Practitioner course audience includes all teams across the Business, IT and Risk functions, including:

  • IT Service Management
    • Operations and Incident management
    • IT Change & Release management
    • IT Supplier & Vendor management
  • Business Analysis and Design
    • Business analysts
    • IT Architects
  • Development
  • IT Project & Programme Management
  • Risk and Compliance
    • Information Security management
    • Business Continuity managers

Learning Objectives

Individuals certified at this level will:

  • Be able to carry out risk management.
  • Be able to manage the controls relevant to cyber resilience strategy and align these with IT service management (ITSM).
  • Be able to manage the controls relevant to cyber resilience design and align these with ITSM.
  • Be able to manage the controls relevant to cyber resilience transition and align these with ITSM.
  • Be able to manage the controls relevant to cyber resilience operation and align these with ITSM.
  • Be able to manage the controls relevant to cyber resilience continual improvement and align these with ITSM.
  • Be able to evaluate need for segregation of duties and dual controls.

Benefits of Taking This Course

In this course, participants are exposed to various scenarios where they can apply their foundation level knowledge and concepts of cyber resilience controls and procedures. This strategy will enable participants to manage and operate effectively in a challenging cyber centric environment. The course takes into consideration the limitations of traditional security controls to combat today’s sophisticated cyber attacks. This proactive approach to design and use new and effective controls along with industry compliance standards would assist in making decisions to prevent, detect, respond, and recover from today’s evolving cyber-threats.


With completing this course, you will be well versed and highly equipped in an organization to govern, manage, and comply with cyber resilience.

Prerequisites

RESILIA Foundation Certification.

Trainer

Due to the close relationship between RESILIA and ITIL it is essential that your trainer understands both. All our RESILIA trainers are ITIL Experts as well as RESILIA Practitioners.

Course Materials

Participants receive a copy of the classroom presentation material in the Participant Handbook.

Course Agenda

Day 1 Day 2
M1: Course Introduction Recap and discussion
M2: Risk Management M5: Cyber Resilience Transition
M3: Cyber Resilience Strategy M6: Cyber Resilience Operation
M4:Cyber Resilience Design M7: Cyber Resilience Continual Improvement
  M8: Segregation of Duties and Dual Controls

Course Outline

Module 1: Course Introduction

1.1 Let us get to know each other

1.2 Course learning objectives

1.3 Course agenda

1.4 Activities

1.5 Module end questions

1.6 Course book structure

1.7 RESILIA certification

 

Module 2: Risk Management

2.1 Distinguish between the terms: risk, asset, vulnerability, threat

2.2 Determine the actions needed to address risks and opportunities and explain their purpose

2.3 Create and manage a:

a) Risk register

b) Risk treatment plan

 

Module 3: Cyber Resilience Strategy

3.1 Explain the purpose and use of the control objectives:

a) Establish governance

b) Manage stakeholders

c) Identify and categorize stakeholders

d) Create and manage cyber resilience policies

e) Manage audit and compliance

3.2 Explain how ITSM processes and cyber resilience interact

 

Module 4: Cyber Resilience Design

4.1 Explain the purpose and use of the control objectives:

a) Human resource security

b) System acquisition, development, architecture and design

c) Supplier and 3rd party security

d) Endpoint security

e) Cryptography

f) Business continuity

4.2 Explain how ITSM processes and cyber resilience interact

 

Module 5: Cyber Resilience Transition

5.1 Explain the purpose and use of the control objectives:

a) Asset management and configuration management

b) Classification and handling

c) Data transportation and removable media

d) Change management

e) Testing

f) Training

g) Documentation management

h) Information retention

i) Information disposal

5.2 Explain how ITSM processes and cyber resilience interact


Module 6: Cyber Resilience Operation

6.1 Explain the purpose and use of the control objectives:

a) Access control

b) Network security management

c) Physical security

d) Operations security

e) Incident management

6.2 Explain how ITSM processes and cyber resilience interact

 

Module 7: Cyber Resilience Continual Improvement

7.1 Explain the purpose and use of the control objectives:

a) Audit and review

b) Control assessment

c) Key Performance Indicators

d) Business continuity improvements

e) Process improvements

f) Remediation and improvement planning

7.2 Apply the seven-step improvement process to plan cyber resilience improvements

7.3 Apply the ITIL CSI approach to cyber resilience

 

Module 8: Segregation of Duties and Dual Controls

8.1 Apply the concepts of segregation of duties and dual controls to an organizational context

Need to talk?

 

Call us free on:

0800 246 1 468

E-mail:

enquiries@zindiak.co.uk

 

Write:

Zindiak Limited

83 Ducie Street

Manchester
M1 2JQ

 

Or use our contact form.

Privacy Policy
Print Print | Sitemap
© Zindiak Limited. ITIL®, PRINCE2®, PRINCE2 Agile®, MSP®, M_o_R®, P3O®, MoP®, MoV® and RESILIA® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. ICM and C:SM are trademarks of ACQUIROS, Inc.