Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by exploring its purpose, essential terminology, the difference between resilience and security, and the advantages of adopting cyber resilience. It introduces risk management along with the primary activities required to manage risks and capitalize on opportunities. Additionally, it highlights the importance of widely recognized management standards and best-practice frameworks in achieving cyber resilience. The course then outlines the cyber resilience processes, linked control objectives, and the interactions and activities that should align with relevant ITSM processes. Finally, it addresses the separation of duties and dual controls associated with cyber resilience roles and responsibilities.
This course is available as onsite live training in Bulgaria or online live training.Course Outline
- Develop and implement cyber resilient strategies and services throughout your organization, tailored to your business requirements
- Integrate cyber resilience into existing systems and operational processes
- Create a unified terminology for cyber resilience across the organization
- Reduce the impact of security breaches and facilitate rapid response and recovery
Requirements
- Foundational knowledge of organizational structures and employee roles
- Basic understanding of cyber security concepts
- It is advisable to complete the ITIL Foundation course prior to taking this course
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (2)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is designed to empower attendees with the skills needed to build organizational resilience against various threats, ensuring that businesses can effectively respond to incidents, maintain operational availability, and protect their interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally renowned and most widely recognized certification for professionals engaged in IS auditing and IT risk consulting.
Our CISA course is an intensive, highly competitive, and exam-oriented training program. Having delivered over 150 CISA training sessions in Europe and worldwide, and trained more than 1,200 delegates, Net Security has developed its CISA materials in-house with the primary objective of ensuring that participants pass the ISACA CISA® Exam. Our methodology emphasizes a deep understanding of CISA IS auditing concepts and extensive practice with large banks of ISACA-released questions from the past three years. Over time, CISA-certified professionals have become highly sought after by prominent accounting firms, global banks, advisory and assurance departments, and internal audit teams.
While delegates may bring years of IT auditing experience, their ability to solve CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notably challenging due to the subtle distinctions between plausible answers, which is where ISACA assesses your understanding of global IT auditing standards. To help navigate these challenges, we provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual comprehensively covers all exam-relevant concepts, case studies, and Q&A across the five CISA domains. Additionally, trainers provide essential supporting materials during the course, including CISA notes, question banks, glossaries, videos, revision documents, exam tips, and CISA mind maps.
Goal:
The ultimate objective is to help you pass your CISA examination on the first attempt.
Objectives:
- Apply acquired knowledge in a practical manner that benefits your organization
- Deliver audit services in compliance with IT audit standards
- Provide assurance regarding leadership, organizational structure, and processes
- Provide assurance on the acquisition, development, testing, and implementation of IT assets
- Provide assurance on IT operations, including service operations and third-party management
- Provide assurance that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets
Target Audience:
Finance and CPA professionals, IT professionals, internal and external auditors, and information security and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is delivered as a workshop enriched with in-depth theoretical knowledge. The sessions are aligned with the official CISA certification framework. Throughout the workshop, case studies will be utilized to explore specific issues in detail. Classes will be conducted in English (Polish is available upon request), utilizing the English ISACA handbook as the primary reference.
Scope of CISA Exam Material:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice test
Number of Questions: 200
Requirements to be eligible for CISA certification:
- Successfully pass the CISA exam. The passing score is 450 or higher.
- Adhere to the ISACA Code of Professional Ethics.
- Agree to comply with the CISA Continuing Professional Education Policy.
- Accumulate a minimum of 5 years of professional work experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and believe you meet these requirements, you can start the certification application: apply for certification here
A processing fee of $50 is required for this application.
Additionally, there is an annual fee to maintain your certification after it has been granted. The fee is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) credential, granted by (ISC)², is a globally acknowledged certification designed for senior information security experts. It confirms expertise across eight distinct security domains and enhances professional credibility for positions such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (available online or onsite) targets intermediate to advanced security professionals aiming to achieve both conceptual depth and practical readiness for passing the CISSP certification exam on their first attempt, while applying these principles within real-world organizational settings.
Upon completion of this training, participants will be able to:
- Comprehend and apply the eight CISSP domains within security governance and operational practice.
- Create, evaluate, and enhance organizational security policies, architectures, and controls.
- Design and deploy security solutions that align with legal requirements, compliance standards, and business goals.
- Approach and answer CISSP exam-style questions with strategic confidence.
Course Format
- Lectures and guided walkthroughs of each domain.
- Practice questions, scenario-based discussions, and quizzes.
- Practical labs, case studies, and collaborative exercises.
Course Customization Options
- For requests regarding customized domain focus or extended exam review sessions, please contact us to make arrangements.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Bulgaria (online or on-site) targets beginner to intermediate system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
Upon completion of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Deploy Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Create firewall rules to control traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course serves as an intensive, rigorous preparation for the ISACA Certified in Risk and Information Systems Control (CRISC) examination. The curriculum thoroughly addresses the four (4) most recent domains of the ISACA CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the official ISACA CRISC Review Manual along with the Question, Answer, and Explanation (Q,A&E) supplements. These resources are invaluable for helping delegates master the specific style of ISACA questions, understand the types of answers expected, and facilitate rapid retention of the course material.
The technical competencies and professional practices endorsed and evaluated by ISACA through the CRISC certification form the foundation for success in this industry. Holding the CRISC certification validates your expertise within the field. Given the increasing demand for professionals with specialized risk and control knowledge, ISACA’s CRISC has established itself as the preferred certification choice for individuals and organizations globally. Earning this certification reflects a dedication to serving your enterprise and profession with excellence.
Objectives:
- To equip you with the knowledge necessary to pass the CRISC examination on your first attempt.
- Demonstrate your commitment to delivering distinguished service to your organization through certification.
- Leverage the growing market demand for risk and control expertise to secure superior career positions and compensation packages.
You will learn:
- How to enable enterprises to achieve their business goals by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The core technical skills and professional practices promoted by CRISC, which are essential building blocks for career success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis live, instructor-led training in Bulgaria (online or on-site) is designed for intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, while preparing for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Bulgaria (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Bulgaria (online or onsite) is designed for intermediate to advanced IT professionals and business leaders seeking to develop a structured approach to handling data breaches.
Upon completion of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led live training in Bulgaria (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO 27005 Risk Manager
21 HoursThis training course demonstrates how risk assessment for information security is conducted by integrating the guidance from ISO/IEC 27005:2022 and ISO/IEC 27001. Beyond theoretical knowledge, the course includes practical exercises, quizzes, and case studies, making it a highly engaging learning experience.
Business Continuity Management
35 HoursOverview:
This is a 'Practitioner' level course that emphasizes practical exercises aimed at reinforcing taught concepts and building delegates' confidence in implementing business continuity management. The curriculum also encourages debate and the sharing of knowledge and experience among students.
Delegates will benefit from the extensive practical experience of our trainers, who are practicing business continuity management professionals and ISO 22301:2019 specialists.
Learning Outcomes:
- Explain the necessity of business continuity management (BCM) across all organizations
- Define the business continuity lifecycle
- Manage the business continuity programme
- Gain sufficient insight into their organization to identify mission-critical impact areas
- Determine the organization's business continuity strategy
- Establish a business continuity response
- Exercise, maintain, and review plans
- Embed business continuity within an organization
- Define terms and definitions specific to business continuity
By the end of the course, delegates will possess a detailed understanding of all key components of business continuity management and will be equipped to return to their roles, making a significant contribution to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training session (available online or onsite) is designed for security engineers who aim to leverage IBM Qradar SIEM to address critical security use cases.
By the conclusion of this training, participants will be able to:
- Achieve visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt down threats and contain associated risks.
- Detect, identify, and prioritize threats effectively.
Snyk
14 HoursThis instructor-led, live training in Bulgaria (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis program explores fundamental principles of security and IT security, focusing primarily on defenses against network-based threats. Learners will develop a solid comprehension of critical security protocols and the security frameworks underlying web services. The curriculum integrates references to recent cryptosystem attacks and associated vulnerabilities within practical laboratory sessions and threat modeling activities.