This course begins with a small amount of reviewing the concepts and knowledge gained in the Foundation course and turns out that knowledge into practical activities with real life scenarios. The course proceeds with distinguishing among the terms: asset, risk, threat and vulnerability buy determining the key activities which is required to address risks and opportunities and also to create and manage a risk register and a risk treatment plan. It also explains the purpose and use of the control objectives for cyber resilience processes, and the interactions and activities that are aligned with corresponding ITSM activities. The final stage of the course will be describing about the application of the process to plan cyber resilience improvements, the ITIL CSI approach to cyber resilience and the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
Audience
Live Virtual Classroom (Instructor-Led)
Fee : On Request
9 AM - 5 PM |
|
Special Solutions for Corporate Clients! Click here |
Hire Our Trainers! Click here |
Upon completion of this course, you will be able to accomplish: