Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, defining key terms, and clarifying the distinction between resilience and security, alongside the advantages of adopting a cyber resilience approach. It introduces risk management concepts and the essential activities required to tackle both risks and opportunities. Furthermore, it highlights the importance of established management standards and best practice frameworks in achieving effective cyber resilience. Subsequently, the course identifies the core cyber resilience processes, their associated control objectives, and the interactions and activities that must align with relevant ITSM processes. In the concluding section, it details the segregation of duties and dual controls pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in Greece or online live training.Course Outline
- Design and implement cyber resilient strategies and services across your organization, tailored to your specific business requirements
- Seamlessly integrate cyber resilience into your current systems and operational processes
- Create a unified vocabulary for cyber resilience throughout your organization
- Reduce the impact of security incidents and facilitate rapid response and recovery
Requirements
- Fundamental knowledge of organizational structures and employee roles
- A basic understanding of cybersecurity principles
- Attendance of the ITIL Foundation course is recommended prior to this course
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is crafted to equip participants with the skills needed to foster organizational resilience against diverse threats, enabling effective incident response, sustained business operational availability, and the protection of organizational interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally recognized and most widely held certification for professionals specializing in IT audit and risk consulting.
Our CISA course offers intensive, highly competitive, and exam-oriented training. Drawing on a track record of delivering over 150 CISA training sessions across Europe and globally, and having trained more than 1,200 delegates, Net Security has developed its in-house training materials with the primary objective of ensuring delegates pass the ISACA CISA® Exam. The methodology emphasizes a deep understanding of CISA IS auditing concepts alongside extensive practice using ISACA question banks released over the past three years. Over time, CISA-certified professionals have become highly sought after by leading accounting firms, international banks, advisory and assurance agencies, and internal audit departments.
While delegates may possess years of experience in IT auditing, their ability to answer CISA questions correctly depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notoriously challenging because it often presents two plausible answers, testing your nuanced understanding of global IT auditing standards. To overcome these challenges, we employ top-tier trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual encompasses all exam-relevant concepts, case studies, and Q&A sessions across the five CISA domains. Additionally, trainers provide essential supporting materials throughout the course, including CISA notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps.
Goal:
The ultimate objective is to pass your CISA examination on the first attempt.
Objectives:
- Apply gained knowledge practically to benefit your organization
- Deliver audit services in compliance with IT audit standards
- Provide assurance regarding leadership, organizational structure, and processes
- Provide assurance regarding the acquisition, development, testing, and implementation of IT assets
- Provide assurance on IT operations, including service operations and third-party engagements
- Provide assurance that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets
Target Audience:
Finance and CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is delivered as an interactive workshop enriched with substantial theoretical knowledge. The curriculum aligns with the official CISA certification framework. Throughout the workshop, case studies are analyzed to address specific professional challenges. Instruction is conducted in English (Polish available upon request), utilizing the ISACA handbook as the primary resource.
CISA Exam Content Domains:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice questions
Number of Questions: 200
To qualify for the CISA designation, you must satisfy the following requirements:
- Successfully pass the CISA exam with a score of 450 or higher.
- Adhere to the ISACA Code of Professional Ethics.
- Commit to the CISA Continuing Professional Education (CPE) Policy.
- Obtain a minimum of 5 years of professional experience in information systems auditing, control, or security.
- Comply with ISACA Information Systems Auditing Standards.
If you have passed the exam and believe you meet these criteria, you can initiate your certification application via the official ISACA page.
A processing fee of $50 applies to this application.
Additionally, an annual maintenance fee is required to keep your certification active. ISACA members pay $40 per year, while non-members pay $75 per year.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, awarded by (ISC)², stands as a globally recognized credential for senior information security professionals. It validates comprehensive mastery across eight security domains, establishing credibility in executive roles such as Chief Information Security Officer (CISO), Security Engineer, and Senior Security Manager.
This instructor-led, live training (available online or onsite) targets intermediate to advanced security practitioners aiming to achieve both conceptual mastery and practical readiness. The goal is to ensure successful passage of the CISSP certification exam on the first attempt, while effectively applying these principles within real-world organizational contexts.
Upon completion of this training, participants will be able to:
- Comprehend and apply the eight CISSP domains within security governance and daily practice.
- Create, evaluate, and enhance organizational security policies, architectures, and controls.
- Design and implement security solutions that align with legal requirements, compliance standards, and business goals.
- Interpret and answer exam-style CISSP questions with confidence and strategic insight.
Format of the Course
- Lectures accompanied by guided walkthroughs of each domain.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and collaborative group exercises.
Course Customization Options
- For requests regarding customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP-certified professional is an information assurance expert responsible for defining the architecture, design, management, and controls that ensure the security of business environments. The extensive breadth of knowledge and the experience required to pass the examination distinguish a CISSP from others. This credential signifies a globally recognized level of competency provided by the (ISC)2® CBK®, covering critical security topics such as cloud computing, mobile security, application development security, risk management, and more.
This course facilitates a comprehensive review of the 10 domains of information security practices. It also serves as a robust learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review the core topics of the CISSP CBK (Common Body of Knowledge).
- To prepare for the CISSP examination.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Greece (online or on-site) targets beginner to intermediate system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
Upon completing this training, participants will be able to:
- Configure Cloudflare for their websites.
- Establish DNS records and SSL certificates.
- Deploy Cloudflare for content delivery and caching.
- Safeguard websites against DDoS attacks.
- Establish firewall rules to control and restrict traffic.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course offers intensive and rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The curriculum covers the four (4) domains of ISACA’s latest CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the Official ISACA CRISC Review Manual and the Question, Answer and Explanation (Q&A&E) supplements. The Q&A&E resource is invaluable for helping delegates understand the ISACA question style, the types of answers ISACA seeks, and it facilitates rapid assimilation of the material.
The technical skills and practices promoted and evaluated by ISACA within the CRISC certification form the foundation for success in this field. Holding the CRISC certification demonstrates professional competence and expertise. With increasing demand for professionals skilled in risk and control, ISACA’s CRISC has become the preferred certification program for individuals and organizations worldwide. The CRISC certification reflects a commitment to serving an enterprise and one's profession with distinction.
Objectives:
- Assist you in passing the CRISC examination on the first attempt.
- Demonstrate your dedication to serving an enterprise with excellence.
- Leverage the growing demand for professionals with risk and control skills to secure better positions and salary opportunities.
You will learn:
- How to help enterprises achieve business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices promoted by CRISC, which serve as the building blocks for success in this field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Greece (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Greece (online or onsite) is designed for supply chain professionals looking to establish robust control and oversight of their operations, with a particular focus on cybersecurity.
Upon completion of this training, participants will be able to:
- Identify security oversights that can cause significant damage and disruption to a supply chain.
- Decompose complex security challenges into manageable and actionable components.
- Tackle common supply chain vulnerabilities by analyzing high-risk areas and engaging effectively with stakeholders.
- Implement best practices for securing a supply chain.
- Significantly reduce or eliminate the major risks facing an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Greece (online or on-site) is tailored for IT professionals and business leaders at intermediate to advanced levels who wish to develop a structured approach to managing data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Greece (online or onsite) is designed for developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
Designed for professionals at the 'Practitioner' level, this course emphasizes hands-on exercises aimed at reinforcing core concepts and building participants' confidence in executing business continuity management. It also fosters an environment of debate and knowledge exchange among students.
Participants will gain valuable insights from our trainers, who are active practitioners in business continuity management and specialists in ISO 22301:2019.
Key Learning Outcomes:
- Articulate the necessity of business continuity management (BCM) across all types of organizations.
- Define the business continuity lifecycle.
- Manage business continuity programmes effectively.
- Gain sufficient insight into the organization to pinpoint mission-critical impact areas.
- Formulate an appropriate business continuity strategy.
- Establish an effective business continuity response framework.
- Exercise, maintain, and review continuity plans.
- Embed business continuity principles within the organization.
- Utilize terminology specific to business continuity correctly.
Upon completion, participants will possess a comprehensive understanding of the essential elements of business continuity management, enabling them to make substantial contributions to the BCM process upon returning to their roles.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Greece (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Greece (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis programme introduces the fundamental principles of security and IT security, with a strong focus on mitigating network-based threats. Attendees will develop a solid grasp of key security protocols and the underlying security frameworks of web services. The curriculum also examines recent attacks on cryptosystems and highlights associated vulnerabilities.