RESILIA Foundation 3 Days Training in Memphis, TN

Other

5100 Poplar Avenue Clark, Tower, 27th Floor,Memphis TN 38137

23 June, 2021

Description

Our classroom training provides you the opportunity to interact with instructors and benefit from face-to-face instruction. Course Description: AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process, and technology.  The RESILIA TM Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.  Course Topics: Module 1: Course Introduction Course Learning ObjectivesCourse AgendaActivitiesCourse Book StructureRESILIA CertificationModule 2: Introduction to Cyber Resilience What is Cyber Resilience?Defining Cyber ResilienceBalancing in Cyber ResilienceCharacteristics of Cyber ResilienceModule 3: Risk Management Understanding Risk Management: DiscussionDefining Risk ManagementAddressing Risks and OpportunitiesModule 4: Managing Cyber Resilience Why and What of Management Systems?Management SystemsCommon Management Standards and FrameworksModule 5: Cyber Resilience Strategy What is Strategy?Cyber Resilience Strategy and ActivitiesSecurity Controls at Cyber Resilience StrategyInteraction Between ITSM Processes and Cyber ResilienceModule 6: Cyber Resilience Design Why Cyber Resilience Design?Cyber Resilience Design ActivitiesSecurity Controls at Cyber Resilience DesignAligning ITSM Processes with Cyber Resilience ProcessesModule 7: Cyber Resilience Transition Why Cyber Resilience Transition?Basics of Cyber Resilience TransitionCyber Resilience Transition: ControlsInteraction Between ITSM Processes and Cyber ResilienceModule 8: Cyber Resilience Operation The Purpose of Cyber Resilience OperationSecurity Controls in Cyber Resilience OperationInteraction Between IT Processes and Cyber ResilienceInteraction Between ITSM Functions and Cyber ResilienceModule 9: Cyber Resilience Continual Improvement Continual or Continuous ImprovementMaturity ModelsContinual Improvement ControlsThe Seven-Step Improvement ProcessThe ITIL CSI ApproachModule 10: Cyber Resilience Roles & responsibilities Segregating DutiesDual ControlsLearning Goals: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience.Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities.Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute.Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities.Demonstrate your knowledge of cyber resilience design, the associated control objectives and their interactions with ITSM activities.Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities.Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities.Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities.Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls.Course Agenda: Day 1 Course IntroductionIntro to Cyber ResilienceRisk ManagementManaging Cyber ResilienceCyber Resilience StrategyCyber Resilience DesignEnd of Day Case Study AssignmentDay 2 Cyber Resilience DesignCyber Resilience TransitionCyber Resilience TransitionCyber Resilience OperationEnd of Day Case Study AssignmentDay 3 Cyber Resilience OperationCyber Resilience Continual ImprovementCyber Resilience Roles and ResponsibilitiesExam Preparation GuideWho can Attend? The RESILIA TM Foundation course audience includes all teams across the IT and Risk functions, including:  IT Service ManagementOperations and Incident ManagementIT Change and Release ManagementIT Supplier and Vendor ManagementBusiness Analysis and DesignBusiness AnalystsIT ArchitectsDevelopmentIT Project and Programme ManagementRisk and ComplianceInformation Security ManagementBusiness Continuity Managers Click here to subscribe to our text messages. Who we are Mangates is one of the Leading Competency developers, Mangates has developed a proven foundation for building specialized training programs. No matter which Mangates training division you are working with, you can expect the same high-quality training experience and expertise that makes Mangates stand out above the competition. All of our instructors are recognized experts in their fields with hands-on experience on the topics they teach. We combine proven adult educational training methods with leading-edge industry expertise to provide you an exceptional training experience. Every instructor must meet rigorous standards with the proven background in their given field of expertise. It is the difference that our customers covet and participant appreciates at the completion of the course. What we do We deliver training solutions to Corporate, Government Agencies, Public sectors, Multinational organizations and Private Individuals. Our Primary focus is to train in a wide range of areas from IT Technical, Personal Development, Human Resources and Management Courses to Project, Program and IT Service Management. We have most experienced trainers in the Industry. Our Trainers are highly skilled in their subject areas and are uniquely positioned to provide participants with deep industry experience. They are motivated to transfer knowledge through practical support post and pre-training to provide participants with additional support outside the classroom.     https://www.youtube.com/watch?v=ca-9iJ4zw0Q  

By:  view source

Discussion

By posting you agree to the Terms and Privacy Policy.

/
Search this area