Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by exploring its purpose, essential terminology, the difference between resilience and security, and the advantages of adopting cyber resilience. It covers risk management and the primary activities required to handle risks and opportunities. The course also highlights the importance of widely used management standards and best practice frameworks in achieving cyber resilience. It then outlines the cyber resilience processes, their control objectives, and the necessary interactions and activities that align with relevant ITSM practices. Finally, the course addresses the separation of duties and dual control mechanisms concerning cyber resilience roles and responsibilities.
This course is available as onsite live training in Norway or online live training.Course Outline
- Design and implement cyber resilient strategies and services throughout your organization, tailored to your business requirements
- Incorporate cyber resilience into your current systems and operational processes
- Create a unified terminology for cyber resilience across your organization
- Reduce the impact of security breaches and facilitate rapid response and recovery
Requirements
- Fundamental knowledge of organizational structures and employee roles
- Basic understanding of cyber security principles
- Attending the ITIL Foundation course is recommended prior to this course
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is designed to assist participants in strengthening organizational resilience against various threats, enabling organizations to respond effectively to incidents, maintain business operational availability, and protect their interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally recognised and leading certification for professionals specialising in IS audit and IT risk consulting.
Our CISA programme is an intensive, competitive, and exam-oriented training course. Having successfully delivered over 150 CISA trainings across Europe and globally, while training more than 1,200 delegates, Net Security has developed its proprietary training materials with the primary objective of ensuring CISA candidates pass the ISACA CISA® Exam. The methodology emphasises a deep understanding of CISA IS auditing concepts and extensive practice with question banks released by ISACA over the past three years. Over time, CISA holders have become highly sought after by prestigious accounting firms, global banks, advisory and assurance consultancies, and internal audit departments.
While delegates may possess years of experience in IT auditing, their approach to answering CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notoriously challenging due to the potential for closely matched answer options, which tests your nuanced understanding of international IT auditing standards. To tackle these exam challenges, we provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual encompasses all exam-relevant concepts, case studies, and Q&As across the five CISA domains. Additionally, trainers provide supplementary key materials throughout the course, including CISA notes, question banks, glossaries, videos, revision documents, exam tips, and CISA mind maps.
Goal:
The primary objective is to help you pass your CISA examination on the first attempt.
Objectives:
- Apply acquired knowledge practically to benefit your organisation.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance on leadership, organisational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance that the organisation’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance and CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This workshop combines practical training with comprehensive theoretical knowledge. The curriculum aligns with the official CISA certification framework. Through case studies, participants will explore specific challenges and scenarios. Instruction is conducted in English (Polish available upon request), utilizing the ISACA handbook as the primary resource.
CISA Exam Content Domains:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice test
Number of Questions: 200
To qualify for the CISA designation, candidates must satisfy the following requirements:
- Pass the CISA exam. A score of 450 or higher is required to pass.
- Adhere to the ISACA Code of Professional Ethics
- Commit to complying with the CISA Continuing Professional Education Policy
- Accumulate a minimum of 5 years of professional work experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards
If you have passed the exam and believe you meet these criteria, you may submit your certification application: click here to certify
An application fee of $50 applies.
Additionally, you are required to pay an annual maintenance fee to keep your certification active. The fee is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.
This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led live training in Norway (online or onsite) is designed for beginner to intermediate system administrators and security professionals aiming to learn how to implement Cloudflare for content delivery, cloud security, and DDoS mitigation.
Upon completing this training, participants will be able to:
- Configure Cloudflare for their web properties.
- Establish DNS records and SSL certificates.
- Deploy Cloudflare for efficient content delivery and caching.
- Defend websites against DDoS attacks.
- Apply firewall rules to control and restrict web traffic.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed as an intensive and rigorous preparation for the ISACA Certified in Risk and Information Systems Control (CRISC) exam. The training covers the four (4) most recent domains of the ISACA CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the Official ISACA CRISC Review Manual, along with the Question, Answer, and Explanation (Q&A&E) supplements, upon attendance. The Q&A&E resource is particularly valuable for helping attendees grasp the specific style of ISACA questions, identify the types of answers ISACA expects, and accelerate the absorption of the course material.
The technical skills and practices promoted and evaluated by ISACA within the CRISC certification form the foundation for success in this profession. Holding the CRISC certification validates your professional expertise. As the demand for professionals with risk and control expertise continues to rise, ISACA’s CRISC has become the preferred certification for individuals and organizations worldwide. The CRISC certification reflects a commitment to serving an enterprise and one’s profession with distinction.
Objectives:
- To support you in passing the CRISC examination on your first attempt.
- Obtaining this certification demonstrates your dedication to serving an enterprise with excellence.
- Due to the increasing demand for professionals with risk and control competencies, certification holders can secure better career positions and salary levels.
You will learn:
- How to assist enterprises in achieving their business objectives by designing, implementing, monitoring, and maintaining efficient and effective risk-based IS controls.
- The technical skills and practices endorsed by CRISC, which serve as the building blocks for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Norway (online or onsite) targets intermediate-level IT professionals seeking to strengthen their ability to identify and manage IT risk, implement information systems controls, and prepare for the CRISC certification exam.
Upon completion of this training, participants will be able to:
- Comprehend the governance and risk management dimensions of IT.
- Perform IT risk assessments and execute appropriate risk responses.
- Design and deploy information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Norway (online or onsite) is designed for supply chain professionals seeking to establish robust control and oversight of their supply chains, with a specific focus on cybersecurity.
Upon completion of this training, participants will be able to:
- Identify security oversights that can cause significant damage and disruption to a supply chain.
- Deconstruct complex security challenges into manageable, actionable components.
- Tackle common supply chain vulnerabilities by analyzing high-risk areas and collaborating with stakeholders.
- Implement best practices for securing the supply chain.
- Significantly reduce or eliminate major risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Norway (online or onsite) targets intermediate to advanced IT professionals and business leaders aiming to establish a structured approach to managing data breaches.
Upon completion of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursCourse Overview
Designed for practitioners, this course emphasizes hands-on exercises aimed at reinforcing core concepts and building participants' confidence in applying business continuity management principles. It also fosters an environment for debate and the exchange of knowledge and practical experience among attendees.
Delegates gain valuable insights from the extensive practical experience of our trainers, who are active business continuity management professionals and ISO 22301:2019 specialists.
Learning Outcomes
-
Articulate the necessity of business continuity management (BCM) across all organizational types.
-
Define the business continuity lifecycle.
-
Manage the business continuity programme effectively.
-
Analyze the organization to identify mission-critical impact areas.
-
Develop the organization's business continuity strategy.
-
Establish a robust business continuity response.
-
Exercise, maintain, and review continuity plans.
-
Integrate business continuity into the organizational culture.
-
Define key terms and definitions relevant to business continuity.
Upon completion, participants will possess a comprehensive understanding of the essential components of business continuity management, enabling them to return to their roles and make substantial contributions to their organization's continuity efforts.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course explores the fundamental principles of IT security, with a primary focus on defending against network-based threats. Participants will develop a solid grasp of key security protocols and the core security concepts underlying web services. The curriculum also references recent attacks targeting cryptosystems and highlights associated vulnerabilities.