Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by exploring its core purpose, fundamental terminology, the distinction between resilience and security, and the advantages of adopting cyber resilience. It covers the principles of risk management and the essential activities required to tackle both risks and opportunities. Additionally, it highlights the importance of widely recognized management standards and best practice frameworks in achieving cyber resilience. The course then outlines the specific cyber resilience processes, their associated control objectives, interactions, and activities, emphasizing their alignment with corresponding ITSM activities. Finally, it addresses the segregation of duties and dual controls pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in France or online live training.Course Outline
- Design and implement cyber resilient strategies and services across your organization, tailored to your business requirements
- Integrate cyber resilience seamlessly into your existing systems and processes
- Develop a unified terminology for cyber resilience throughout your organization
- Reduce the impact of security incidents and facilitate rapid response and recovery
Requirements
- Fundamental knowledge of organizational structures and employee roles
- Basic understanding of cyber security concepts
- Attending the ITIL Foundation course beforehand is recommended
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
NobleProg offers professional training programs designed specifically for companies and organizations. These trainings are not intended for individuals.
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is designed to assist participants in building organizational resilience against various threats, enabling them to respond effectively to incidents, maintain the availability of business operations, and safeguard organizational interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally recognized and most widely adopted certification for professionals operating within the realms of information systems auditing and IT risk consulting.
Our CISA programme is an intensive, highly competitive, and exam-oriented training course. Drawing on our experience of delivering over 150 CISA trainings across Europe and worldwide, alongside training more than 1,200 delegates, the Net Security CISA curriculum has been developed in-house. Our primary objective is to ensure that delegates successfully pass the ISACA CISA® Exam. The methodology emphasizes a deep understanding of CISA IS auditing concepts and rigorous practice using extensive question banks released by ISACA over the past three years. Over time, CISA holders have become highly sought after by prestigious accounting firms, global banks, advisory practices, assurance departments, and internal audit teams.
While delegates may possess extensive experience in IT auditing, their ability to approach CISA questionnaires effectively relies entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notably challenging due to the potential for closely matched correct and incorrect answers, which tests your nuanced understanding of international IT auditing standards. To help navigate these challenges, we consistently provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual comprehensively covers all exam-relevant concepts, case studies, and Q&A sections across the five CISA domains. Additionally, throughout the course, trainers provide key supporting materials, including CISA notes, question banks, glossaries, videos, revision documents, exam tips, and CISA mind maps.
Goal:
The ultimate objective is to achieve a first-time pass on your CISA examination.
Objectives:
- Apply gained knowledge in a practical manner to benefit your organization
- Deliver audit services in compliance with IT audit standards
- Provide assurance regarding leadership, organizational structure, and processes
- Provide assurance on the acquisition, development, testing, and implementation of IT assets
- Provide assurance on IT operations, including service operations and third-party engagements
- Provide assurance on the organization’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance and CPA professionals, IT professionals, Internal and External auditors, Information security specialists, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is structured as a workshop enriched with comprehensive theoretical knowledge. The curriculum aligns with the official CISA certification framework. Participants will engage in case studies to analyze specific challenges. Instruction is delivered in English (with Polish available upon request), utilizing the ISACA handbook as the primary reference.
CISA Exam Content Distribution:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice test
Number of Questions: 200
To claim the CISA designation, candidates must satisfy the following requirements:
- Pass the CISA exam, achieving a minimum score of 450.
- Adhere to the ISACA Code of Professional Ethics
- Commit to the CISA Continuing Professional Education (CPE) Policy
- Possess a minimum of 5 years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards
Once you have passed the exam and confirmed that you meet these criteria, you may initiate your certification application: apply for certification here
An application fee of $50 is required.
Additionally, an annual maintenance fee applies to retain your certification. The cost is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course also allows for the evaluation of participants.
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.
This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in France (online or onsite) is designed for beginner to intermediate-level system administrators and security professionals who want to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
Designed as an intensive and rigorous preparation course for ISACA’s Certified Information Systems Auditor (CRISC) examination, this program covers the four (4) latest domains of the CRISC syllabus with a strong emphasis on exam readiness. Participants will receive the Official ISACA CRISC Review Manual and the Question, Answer and Explanation (Q,A&E) supplements upon enrollment. The Q,A&E resource is particularly valuable for helping candidates grasp the specific style of ISACA questions, understand the types of answers sought, and accelerate the retention of key material.
The technical skills and practices emphasized and evaluated by ISACA in the CRISC certification form the foundation for success in this profession. Holding the CRISC certification validates your expertise within the industry. As demand grows for professionals with specialized risk and control knowledge, ISACA’s CRISC has become the preferred certification for individuals and organizations globally. Earning this certification demonstrates a steadfast commitment to excelling in your enterprise and chosen profession.
Objectives:
- Equip you to pass the CRISC examination on your first attempt.
- Validate your dedication to delivering outstanding service to your enterprise.
- Leverage the increasing market demand for risk and control expertise to secure better career opportunities and salary potential.
You will learn:
- How to help enterprises achieve their business goals by designing, implementing, monitoring, and maintaining efficient and effective risk-based IS controls.
- The technical skills and practices promoted by CRISC, which serve as the essential building blocks for professional success.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in France (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in France (online or onsite) is designed for supply chain professionals seeking to establish robust control and oversight of their operations, with a particular focus on cybersecurity.
Upon completion of this training, participants will be able to:
- Identify security oversights that can cause significant damage and disruption to the supply chain.
- Deconstruct complex security challenges into manageable and actionable components.
- Address common supply chain vulnerabilities by analyzing high-risk areas and engaging with stakeholders.
- Adopt best practices for securing the supply chain.
- Significantly reduce or eliminate the most critical risks facing an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in France (online or onsite) is designed for IT professionals and business leaders at intermediate to advanced levels who aim to establish a structured approach to handling data breaches.
Upon completion of this training, participants will be able to:
- Comprehend the causes and consequences of data breaches.
- Create and execute strategies to prevent data breaches.
- Formulate an incident response plan to contain and mitigate breaches.
- Perform forensic investigations and evaluate the impact of breaches.
- Adhere to legal and regulatory requirements for breach notification.
- Recover from data breaches and enhance overall security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in France (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Business Continuity Management
35 HoursDescription:
This 'Practitioner' level course places a strong emphasis on practical exercises designed to reinforce taught concepts and boost delegates' confidence in implementing business continuity management. It also fosters debate and encourages the sharing of knowledge and experience among participants.
Delegates will benefit from the practical and extensive experience of our trainers, who are active business continuity management professionals and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conduct business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led live training in France (online or on-site) is designed for security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led, live training in France (online or onsite) is designed for developers who want to integrate Snyk into their development workflows to identify and remediate security issues in their code.
By the end of this training, participants will be able to:
- Grasp the features and architecture of Snyk.
- Leverage Snyk to detect and resolve code security issues.
- Incorporate Snyk into the software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis program explores fundamental principles of security and IT security, focusing heavily on strategies to defend against network-based threats. Learners will develop a solid grasp of critical security protocols and the foundational security concepts underlying web services. Throughout practical labs and threat modeling exercises, we will examine recent attacks targeting cryptosystems and analyze associated vulnerabilities.