1300 130 447
Blog Email Google+
 
Price Guide

 

 

About the Knowledge Base

Quick access for subscribers:

Search all the Knowledge Base

Testimonial: I have found that the new HDAA Knowledge Base reduces the time it takes me to research industry stats & reliable information for the ITSM sector. It’s easy to use search functionality encompassing KCS principles, helps to filter & tailor my searches more accurately & there are numerous new services now available through the website. Every time I return to the site there is new information published. Very impressive.
Chris Powderly, Support & Services Manager, Allens

 

ITIL Training

ITIL Foundation Training
ITIL Practitioner Training
DevOps Training
Support Centre Training

Support Centre Consulting
Service Desk Consulting

Service Desk Association

RESILIA™ Practitioner (VIRTUAL COURSE)

Register
Date: 16-17 Aug 2018, 9:00 am-5:00 pm
Venue: Virtual Instructor Led Course
Availability: Virtual , Onsite
Certification: RESILIA™
Prerequisites: RESILIA™ Foundation Certificate
Certification Exam Information
 

PLEASE NOTE:
This course is held Virtually so you will need a quiet room for the duration of the course and a computer or laptop with internet capabilities. A headphone/speaker is also recommended.

About Resilia

RESILIA™ is a framework of best practice to build cyber resilience skills across an organisation. Based on the Cyber Resilience Best Practices guide, it offers practical knowledge to enhance existing management strategies and help align cyber resilience with IT operations, security and incident management. Using the ITIL lifecycle it develops the skills and insight needed to detect, respond to and recover from cyber-attacks.

HDAA Line Separator

Overview

RESILIA™ Practitioner is an additional two-day course which equips individuals with practical skills to achieve the best balance of risk, cost, operational benefits and flexibility within an organisation.

It covers all aspects of Cyber Resilience, beginning with creating and managing a risk treatment plan, and then moving onto creating a cyber resilience strategy. Then, it explains design and how ITSM processes and cyber resilience interact. The next module explores the operational aspect of cyber resilience before finishing with continual business improvements.

Included in Virtual Training

  • Approved Courseware
  • Resilia Foundation Exam
  • Delivered by an approved Resilia Trainer with real world experience
  • All pricing includes GST

HDAA Line Separator

Course Outline:

1. Cyber Resilience Risk Management

  • Introduction to XYZ consulting and training case study
  • Distinguish between the terms: risk, asset, vulnerability, threat
  • Determine the actions needed to address risks and opportunities and explain their purpose
    • Establish context
    • Establish criteria for risk assessment and acceptance
    • Risk identification
    • Risk analysis and evaluation
    • Risk treatment
    • Risk monitoring and review
  • Create and manage a risk register
  • Create and manage a risk treatment plan

 4. Cyber Resilience Change Management

  • Explain the purpose and use of the control objectives:
    • Asset management and configuration management
    • Classification and handling
    • Data transportation and removable media
    • Change management
    • Testing
    • Training
    • Documentation management
    • Information retention
    • Information disposal
  • Explain how ITSM processes and cyber resilience interact
    • Transition planning and support
    • Change management
    • Service asset and configuration management
    • Release and deployment management
    • Service validation and testing
    • Change evaluation
    • Knowledge management
    • Management of organisational change

2. Cyber Resilience Strategy

  • Explain the purpose and use of the control objectives
    • Establish governance
    • Manage stakeholders
    • Identify and categorise stakeholders
    • Create and manage cyber resilience policies
    • Manage audit and compliance
  • Explain how ITSM processes and cyber resilience interact
    • Strategy management for IT Services
    • Service portfolio management
    • Financial management for IT Services
    • Demand management
    • Business relationship management
    • Information risk management and risk treatment

7. Cyber Resilience Operation

  • Explain the purpose and use of the control objectives
    • Access control
    • Network security management
    • Physical security
    • Operations security
    • Incident management
  • Explain how ITSM processes and cyber resilience interact (knowledge of the underlying ITSM processes will not be examined)
    • Event management
    • Incident management
    • Request fulfilment
    • Problem management
    • Access management
    • Service desk
    • Technical management
    • Application management
    • IT operations management

3. Cyber Resilience Design

  • Explain the purpose and key features of the control objectives:
    • Human resource security
    • System acquisition, development, architecture and design
    • Supplier and 3rd party security
    • Endpoint security
    • Cryptography
    • Business continuity
  • Explain how ITSM processes and cyber resilience interact:
    (knowledge of the underlying ITSM processes will not be examined)
    • Design co-ordination
    • Service catalogue management
    • Service level management
    • Availability management
    • Capacity management
    • IT service continuity management

 8. Cyber Resilience Continual Improvement

  • Explain the purpose and use of the control objectives
    • Audit and review
    • Control assessment
    • Key Performance Indicators
    • Business continuity improvements
    • Process improvements
    • Remediation and improvement planning
  • Apply the seven-step improvement process to plan cyber resilience improvements
  • Apply the ITIL CSI approach to cyber resilience
  • Purpose and benefits of segregation of duties and dual controls
    • Segregation of Duties and Dual Control
    • Segregation of duties: development and operations
    • Roles and responsibilities, and separation of controls
    • What is meant by ‘dual control’?
    • Segregation of duties and cyber resilience

 

HDAA Line Separator

Who Should Attend:

The RESILIA™ Practitioner course audience includes all teams across the IT and Risk functions

HDAA Line Separator

Further Details:

PLEASE NOTE:

This course is held Virtually so you will need a quiet room for the duration of the course and a computer or laptop with internet capabilities. A headphone/speaker is also recommended.

Return to our Training Calendar.


About ITIL.

Cancellation & Transfer Policy.

For an On-site quote, please contact HDAA on T: 1300 130 447. 

For HDAA member pricing please view training course fees in the Price Guide

 

 

Cost:
Public:(Non Member) $2508.00 (inc GST)
This course is not currently available online

Register