The addition of RESILIA to the existing AXELOS global best practice portfolio, which includes ITIL®  and PRINCE2®,  brings a common cyber resilience best practice for security, IT service management and business excellence. Active cyber resilience is achieved through people, process and technology. 

The RESILIA Foundation course starts with the best practice purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.

Objectives

Individuals certified at RESILIA Foundation will have demonstrated their knowledge  of:

  • The purpose, benefits, and key terms of cyber resilience.
  • Risk management and the key activities needed to address risks and opportunities.
  • The purpose of a cyber resilience management system and how best practices and standards can contribute.
  • Cyber resilience, the associated control objectives, and their interactions with ITSM activities, from the perspective of each of the ITIL® service lifecycle stages:
  1. Strategy
  2. Design
  3. Transition
  4. Operation
  5. Continual Service Improvement
  • The purpose and benefits of segregation of duties and dual controls.

Audience

This course is aimed to:

All teams across the IT and Risk functions, including:

  • IT Service Management (Operations and Incident management, IT Change & Release management, IT Supplier & Vendor management)
  • Business Analysis and Design (Business analysts, IT Architects)
  • Development
  • IT Project & Program Management
  • Risk and Compliance (Information Security management, Business Continuity managers)

Prerequisites

There are no mandatory prerequisites for taking this training course.

Characteristics

The course has the following characteristics:

  • It is structured in thematic units, followed by end-of-day assignments to enhance understanding.
  • Includes a sample exam, prior to the certification exam.
  • Includes an official certification exam issued by PEOPLECERT.
  • A certificate of course completion is delivered.
  • The length is 3 days.
  • 6 additional hours of personal study during the course are recommended.
  • Has a minimum requirement of 6 and a maximum of 25 participants.

Exam

The certification exam has the following characteristics:

  • Contains 50 multiple choice questions.
  • The length is 100 minutes.
  • A minimum of 33 out of 50 correct answers or 65% is required to pass.
  • It can be paper-based or web-based. When it is paper-based, the results will be notified to the participant afterwards through email. When it is web-based, the participant will get the results immediately after finishing the exam.
  • It is a closed-book exam.
  • The participants who do not pass the exam can take it again any times with an extra cost.

Topics

The course has the following topics:

  1. Course Introduction
  2. Intro to Cyber Resilience
  3. Risk Management
  4. Managing Cyber Resilience
  5. Cyber Resilience Strategy
  6. Cyber Resilience Design
  7. Cyber Resilience Transition
  8. Cyber Resilience Operation
  9. Cyber Resilience Continual Improvement
  10. Cyber Resilience Roles and Responsibilities

Advantages offered by Global Lynx

Global Lynx instructors are certified in different ITSM, Information Security and Risk Management disciplines, and have extensive experience in: 

  • The design and implementation of information security and risk management systems, policies and controls based on industry best practices in public and/or private organizations.
  • The selection, implementation and configuration of tools which support the information security processes.
  • Teaching various information security and ITSM courses in the academic and professional fields.
  • Audits of information security and risk management systems.

The participant receives a high quality student handout.