Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by exploring its purpose, key terminology, the distinction between resilience and security, and the advantages of adopting cyber resilience. It introduces risk management and outlines the essential activities required to address both risks and opportunities. Additionally, it highlights the importance of standard management practices and best-practice frameworks in achieving cyber resilience. The course then details the specific cyber resilience processes, their control objectives, and the necessary interactions and activities that must align with relevant ITSM functions. Finally, it covers the segregation of duties and dual control mechanisms pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in Turkey or online live training.Course Outline
- Design and implement cyber resilience strategies and services across your organization, tailored to your business requirements
- Integrate cyber resilience into your existing systems and operational processes
- Foster a shared vocabulary for cyber resilience throughout your organization
- Reduce the impact of security breaches and facilitate rapid response and recovery
Requirements
- Fundamental knowledge of organizational structures and employee roles
- A basic understanding of cybersecurity principles
- It is advisable to complete the ITIL Foundation course prior to this one
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis program aims to empower participants with the skills to strengthen organizational resilience against various threats, enabling businesses to respond effectively to incidents, sustain operational availability, and protect their key interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the globally recognized and most widely accepted certification for professionals specializing in IS auditing and IT risk consulting.
Our CISA course offers an intensive, highly competitive, and exam-oriented training program. Leveraging extensive experience in delivering over 150 CISA trainings across Europe and worldwide, and having trained more than 1,200 delegates, Net Security has developed its in-house training materials with the primary objective of ensuring that all participants pass the ISACA CISA® Exam. The training methodology emphasizes a deep understanding of CISA IS auditing concepts alongside rigorous practice with large volumes of question banks released by ISACA over the last three years. Over time, CISA holders have seen tremendous demand from prestigious accounting firms, global banks, advisory and assurance departments, and internal audit teams.
While delegates may possess years of IT auditing experience, their ability to effectively tackle CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notoriously challenging due to the close nuances between plausible answers, testing your understanding of global IT auditing standards. To help navigate these exam challenges, we provide top-tier trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual encompasses all exam-relevant concepts, case studies, and Q&A sessions across the five CISA domains. Additionally, trainers provide essential supporting materials during the course, including CISA notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps.
Goal:
The ultimate goal is to pass your CISA examination on the first attempt.
Objectives:
- Apply gained knowledge in practical ways that benefit your organization.
- Deliver audit services in accordance with IT audit standards.
- Provide assurance regarding leadership, organizational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party involvement.
- Provide assurance on the organization’s security policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, Internal & External auditors, Information security specialists, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is delivered as a workshop format, enriched with comprehensive theoretical knowledge. The curriculum is aligned with the official CISA certification framework. During the sessions, we will analyze case studies to address specific professional challenges. Instruction is conducted in English (Polish available upon request), utilizing the ISACA handbook as the primary reference.
CISA Exam Content Breakdown:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple-choice examination
Question Count: 200 questions
To qualify for the CISA certification, you must fulfill the following requirements:
- Pass the CISA exam with a minimum scaled score of 450.
- Adhere to the ISACA Code of Professional Ethics.
- Commit to complying with the CISA Continuing Professional Education (CPE) Policy.
- Accumulate a minimum of 5 years of professional work experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and believe you satisfy these criteria, you may submit your certification application: apply for certification here
An application fee of $50 is required.
Additionally, you must pay an annual renewal fee to maintain your certification. The fee is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) certification, issued by (ISC)², is a globally recognized credential for senior information security professionals. It validates mastery across eight security domains and establishes credibility in roles such as chief information security officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security practitioners who wish to gain both conceptual mastery and practical readiness for successfully passing the CISSP certification exam on the first attempt, while applying principles in real-world organizational contexts.
By the end of this training, participants will be able to:
- Understand and apply the eight CISSP domains in security governance and practice.
- Develop, assess, and strengthen organizational security policies, architectures, and controls.
- Design and implement security solutions aligned with legal, compliance, and business objectives.
- Interpret and answer exam-style CISSP questions with confidence and strategy.
Format of the Course
- Lectures and guided domain walkthroughs.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and group exercises.
Course Customization Options
- To request customized domain focus or extended exam review sessions, please contact us to arrange.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.
This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.
Objectives:
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Turkey (online or on-site) is designed for beginner to intermediate system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course provides intensive, focused preparation for the ISACA Certified Risk and Information Systems Control (CRISC) examination. It comprehensively covers the latest four domains of the ISACA CRISC syllabus, with a strong emphasis on exam readiness. Attendees will also receive the Official ISACA CRISC Review Manual and the Question, Answer and Explanation (Q&A&E) supplement. The Q&A&E resource is particularly valuable for helping participants grasp the specific style of ISACA questions, identify the types of answers required, and facilitate rapid assimilation of the material.
The technical skills and practices promoted and evaluated by ISACA for the CRISC certification form the foundation for success in this field. Holding the CRISC certification attests to your proficiency within the profession. As demand grows for professionals with expertise in risk and control, ISACA’s CRISC has become the preferred certification program for individuals and organizations worldwide. The CRISC certification reflects a commitment to serving an enterprise and the chosen profession with distinction.
Objectives:
- Enable you to pass the CRISC examination on your first attempt.
- Demonstrate your commitment to serving an enterprise with distinction through this certification.
- Position you for better career opportunities and salary potential, leveraging the growing demand for professionals with risk and control skills.
You will learn:
- How to help enterprises achieve business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices promoted by CRISC, which serve as the building blocks for success in this field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Turkey (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Turkey (online or onsite) is designed for supply chain professionals seeking to establish effective control and oversight of their supply chain, with a particular focus on cybersecurity.
By the end of this training, participants will be able to:
- Identify security oversights that can cause significant damage and disruption to a supply chain.
- Break down complex security problems into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high-risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Turkey (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Turkey (available online or onsite) is designed for developers and administrators seeking to produce software and products that comply with HiTrust standards.
Upon completing this training, participants will be capable of:
- Grasping the core concepts of the HiTrust CSF (Common Security Framework).
- Recognizing the administrative and security control domains within the HITRUST CSF.
- Gaining knowledge regarding various HiTrust assessment types and their scoring mechanisms.
- Understanding the certification process and prerequisites for achieving HiTrust compliance.
- Acquiring best practices and practical advice for implementing the HiTrust approach.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner'-level course that places a strong emphasis on practical exercises intended to reinforce the concepts taught and to build participants' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Participants will benefit from the practical and extensive experiences of our trainers who are practicing business continuity management and ISO 22301:2019 specialists.
Participants will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
By the end of the course, participants will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led live training, offered in Turkey (online or onsite), is designed for security engineers who intend to utilize IBM Qradar SIEM to address critical security use cases.
By the conclusion of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led live training in Turkey (online or onsite) is designed for developers who want to integrate Snyk into their development tools to detect and resolve security issues in their code.
Upon completion of this training, participants will be able to:
- Comprehend the features and architecture of Snyk.
- Leverage Snyk to identify and resolve code security vulnerabilities.
- Incorporate Snyk into the software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course introduces fundamental concepts of general security and IT security, with a strong focus on defending against network-based attacks. Participants will develop a solid understanding of key security protocols and the security principles underlying web services. The curriculum also references recent attacks on cryptosystems and some of the related vulnerabilities associated with them.