Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by outlining its purpose, essential terminology, the difference between resilience and security, and the advantages of adopting cyber resilience. It introduces risk management along with the critical activities required to address both risks and opportunities. Additionally, it highlights the importance of standard management practices and best-practice frameworks in achieving cyber resilience. The course then details the cyber resilience processes, their associated control objectives, interactions, and activities, demonstrating how they align with corresponding ITSM activities. In the concluding section, it covers segregation of duties and dual controls pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in Brazil or online live training.Course Outline
- Design and implement cyber-resilient strategies and services across your organization, aligned with business objectives
- Integrate cyber resilience into existing systems and processes
- Establish a unified terminology for cyber resilience throughout your organization
- Minimize the impact of security breaches and facilitate rapid response and recovery
Requirements
- Fundamental knowledge of organizational structures and employee roles
- Basic understanding of cybersecurity principles
- Attendance of the ITIL Foundation course is recommended prior to this course
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (2)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is tailored to help participants build organizational resilience against various threats, enabling organizations to respond effectively to incidents, maintain business operations, and protect their interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® is the globally recognized and most sought-after certification for professionals specializing in IS audit and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-focused training program. Having successfully delivered over 150 CISA trainings across Europe and worldwide, and trained more than 1,200 delegates, Net Security has developed its CISA training materials in-house with the primary objective of ensuring that delegates pass the ISACA CISA® Exam. The training methodology emphasizes a deep understanding of CISA IS auditing concepts and extensive practice with ISACA-released question banks from the past three years. Over time, CISA holders have become highly sought after by renowned accounting firms, global banks, advisory and assurance firms, as well as internal audit departments.
While delegates may have years of experience in IT auditing, their ability to solve CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is particularly challenging due to the possibility of closely matched potential answers, which is where ISACA tests your understanding of global IT auditing practices. To address these challenges, we always provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual covers all exam-relevant concepts, case studies, and Q&As across the five CISA domains. Additionally, the trainer shares key supporting materials such as relevant CISA notes, question banks, a CISA glossary, videos, revision documents, exam tips, and CISA mind maps throughout the course.
Goal:
The ultimate goal is to help you pass your CISA examination on the first attempt.
Objectives:
- Apply the knowledge gained in a practical manner beneficial to your organization.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance on leadership, organizational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance on the organization’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, internal and external auditors, information security professionals, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is delivered as a workshop enriched with comprehensive theoretical knowledge. The sessions adhere to the official CISA certification framework. Throughout the workshop, we will analyze case studies to explore specific issues in depth. Classes are conducted in English (Polish available upon request) using the ISACA English-language handbook as the primary reference.
Scope of CISA Exam Material:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice test
Number of Questions: 200
To claim the CISA qualification, you must fulfill the following requirements:
- Pass the CISA exam, achieving a score of 450 or higher.
- Adhere to the ISACA Code of Professional Ethics.
- Agree to comply with the CISA Continuing Professional Education Policy.
- Acquire at least five years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and believe you meet these requirements, you can start the certification application process: apply for certification here
An application fee of $50 is required.
Additionally, there is an annual fee to maintain your certification after it is granted. The fee is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Brazil (online or on-site) targets beginner to intermediate system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed as an intensive, rigorous preparation program for ISACA’s Certified Risk and Information Systems Control (CRISC) Examination. The curriculum covers the four (4) current domains of the ISACA CRISC syllabus, with a primary emphasis on exam readiness. Participants attending the course will receive the Official ISACA CRISC Review Manual and the Question, Answer, and Explanation (Q&A&E) supplements. The Q&A&E material is particularly valuable for helping delegates grasp the specific style of ISACA questions, understand the types of responses ISACA expects, and facilitate rapid retention of the subject matter.
The technical skills and practices promoted and evaluated by ISACA for the CRISC certification form the foundation for success in this profession. Holding the CRISC certification validates your expertise within the field. Given the increasing demand for professionals with risk and control expertise, ISACA’s CRISC has established itself as the preferred certification program for individuals and enterprises globally. The CRISC certification demonstrates a commitment to serving an enterprise and the chosen profession with distinction.
Objectives:
- To assist you in passing the CRISC examination on your first attempt.
- Earning this certification will demonstrate your commitment to serving an enterprise with excellence.
- The rising demand for professionals with risk and control skills will enable holders of this certification to secure better positions and higher salaries.
What you will learn:
- How to help enterprises achieve their business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IT controls.
- The technical skills and practices promoted by CRISC, which serve as the building blocks for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Brazil (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Brazil (online or onsite) is designed for supply chain professionals who want to establish effective control and oversight of their supply chain, particularly concerning cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can cause significant damage and disruption to a supply chain.
- Break down complex security problems into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high-risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Brazil (online or on-site) targets intermediate to advanced-level IT professionals and business leaders seeking to develop a structured approach to handling data breaches.
Upon completing this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement strategies to prevent data breaches.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Brazil (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO 27005 Risk Manager
21 HoursThis training course teaches how risk assessment for information security is conducted by integrating information from ISO/IEC 27005:2022 and ISO/IEC 27001. In addition to theoretical knowledge, this training course includes practical exercises, quizzes, and case studies, making it a highly engaging learning experience.
Business Continuity Management
35 HoursDescription:
Designed for 'Practitioners', this course emphasizes hands-on exercises intended to reinforce core concepts and boost participants' confidence in executing business continuity management. It also fosters discussion and the exchange of knowledge and experience among attendees.
Participants will gain valuable insights from the extensive practical experience of our trainers, who are active practitioners in business continuity management and specialists in ISO 22301:2019.
Learning Outcomes:
- Articulate the necessity of business continuity management (BCM) across all organizations
- Define the business continuity lifecycle
- Manage the business continuity program effectively
- Gain a deep understanding of their organization to identify critical impact areas
- Establish the organization's business continuity strategy
- Set up a business continuity response framework
- Exercise, maintain, and review continuity plans
- Integrate business continuity into the organizational culture
- Define key terms and definitions relevant to business continuity
Upon completion, participants will possess a comprehensive understanding of all essential components of business continuity management, enabling them to return to their roles and make significant contributions to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Brazil (online or onsite) is tailored for security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in Brazil (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course explores the fundamental principles of security and IT security, focusing primarily on defenses against network attacks. Participants will develop a solid grasp of essential security protocols and the core security concepts underlying web services. The curriculum also examines recent attacks targeting cryptosystems alongside related vulnerabilities.