RESILIA™Practitioner
Certificate: RESILIA™ Practitioner
Duration: 2 days (virtual) classroom
Course Delivery: Classroom, Exam, eBooks
Accreditor: Axelos
Course ID: RESILIA-P
Language: English
PMI® PDUs: 16
Download a PDF of this course here.
AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process and technology.
The RESILIA™ Practitioner course starts by revisiting the concepts and knowledge acquired in the Foundation course and requires you to bring that knowledge into practical activities in interesting real-life scenarios. The course begins with distinguishing among the terms: asset, risk, threat and vulnerability. It determines the key activities needed to address risks and opportunities as well as to create and manage a risk register and a risk treatment plan. Further, it explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. In the final part of the course, it describes the application of the seven-step improvement process to plan cyber resilience improvements, the ITIL CSI approach to cyber resilience and the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
Audience:
The RESILIA™ Practioner course audience includes all teams across the IT and Risk functions, including:
- IT Service Management
- Operations and Incident management
- IT Change & Release management
- IT Supplier & Vendor management
- Business Analysis and Design
- Business analysts
- IT Architects
- Development
- IT Project & Programme Management
- Risk and Compliance
- Information Security management
- Business Continuity managers
Learning Objectives:
Individuals certified at RESILIA™ Foundation will have demonstrated their knowledge of:
- The purpose, benefits, and key terms of cyber resilience.
- Risk management and the key activities needed to address risks and opportunities.
- The purpose of a management system and how best practices and standards can contribute.
- Cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities.
- Cyber resilience design, the associated control objectives and their interactions with ITSM activities.
- Cyber resilience transition, the associated control objectives, and their interactions with ITSM activities.
- Cyber resilience operation, the associated control objectives, and their interactions with ITSM activities.
- Cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities.
- The purpose and benefits of segregation of duties and dual controls.
Benefits of Taking This Course:
“This course, for the first time brings together the cyber resilience best practices based on a process based life cycle refined, improved and tested over a quarter century to assure success.” – Moyn Uddin, Lead Author of the RESILIA training program, and Author of the RESILIA™: Cyber Resilience Best Practice Guide from AXELOS.
Participants to this course learn about the methods and use of preventative, detective, and corrective controls allowing them to recognize risks and to operate effectively in a challenging environment. The course provides insights into common management standards and best practice frameworks that would assist in making decisions to anticipate, counter and/or recover accordingly from cyber-attacks. Participants on completing this course would be better positioned in an organization to effectively govern, manage and comply with cyber resilience.
Prerequisites:
RESILIA™ Foundation Certification.
Course Materials:
Participants receive a copy of the classroom presentation material and a Participant Handbook.
Technical Requirements:
For eBooks:
- Internet is required only for downloading the eBook. The eBooks can be read offline.
- Available on: Desktop, Laptop, Tablet, SmartPhone, eReader.
- Recommended PDF reader: Adobe Reader.
Examination:
- Syllabus scope: understand and recognize RESILIA™: Cyber Resilience Best Practice
- Bloom’s level: 3-4
- Format: Multiple Choice
- Number of questions: 50
- Duration: 135 minutes
- Pass Threshold: 60%
- Exam Format: closed book exam
- Proctoring: Live or Web-proctored
Course Agenda:
Day 1 |
Day 2 |
M1: Course Introduction | Recap and discussion |
M2: Risk Management | M5: Cyber Resilience Transition |
M3: Cyber Resilience Strategy | M6: Cyber Resilience Operation |
M4:Cyber Resilience Design | M7: Cyber Resilience Continual Improvement |
M8: Segregation of Duties and Dual Controls |
Download a PDF of this course here.
Course Outline:
Module 1: Course Introduction
1.1 Let us get to know each other
1.2 Course learning objectives
1.3 Course agenda
1.4 Activities
1.5 Module end questions
1.6 Course book structure
1.7 RESILIA certification
Module 2: Risk Management
2.1 Distinguish between the terms: risk, asset, vulnerability, threat
2.2 Determine the actions needed to address risks and opportunities and explain their purpose
2.3 Create and manage a:
a) Risk register
b) Risk treatment plan
Module 3: Cyber Resilience Strategy
3.1 Explain the purpose and use of the control objectives:
a) Establish governance
b) Manage stakeholders
c) Identify and categorize stakeholders
d) Create and manage cyber resilience policies
e) Manage audit and compliance
3.2 Explain how ITSM processes and cyber resilience interact
Module 4: Cyber Resilience Design
4.1 Explain the purpose and use of the control objectives:
a) Human resource security
b) System acquisition, development, architecture and design
c) Supplier and 3rd party security
d) Endpoint security
e) Cryptography
f) Business continuity
4.2 Explain how ITSM processes and cyber resilience interact
Module 5: Cyber Resilience Transition
5.1 Explain the purpose and use of the control objectives:
a) Asset management and configuration management
b) Classification and handling
c) Data transportation and removable media
d) Change management
e) Testing
f) Training
g) Documentation management
h) Information retention
i) Information disposal
5.2 Explain how ITSM processes and cyber resilience interact
Module 6: Cyber Resilience Operation
6.1 Explain the purpose and use of the control objectives:
a) Access control
b) Network security management
c) Physical security
d) Operations security
e) Incident management
6.2 Explain how ITSM processes and cyber resilience interact
Module 7: Cyber Resilience Continual Improvement
7.1 Explain the purpose and use of the control objectives:
a) Audit and review
b) Control assessment
c) Key Performance Indicators
d) Business continuity improvements
e) Process improvements
f) Remediation and improvement planning
7.2 Apply the seven-step improvement process to plan cyber resilience improvements
7.3 Apply the ITIL CSI approach to cyber resilience
Module 8: Segregation of Duties and Dual Controls
8.1 Apply the concepts of segregation of duties and dual controls to an organizational context
Download a PDF of this course here.
RESILIA™ is a trade mark of AXELOS Limited. All rights reserved. Material is reproduced under licence from AXELOS.