SlideShare a Scribd company logo
1 of 6
Download to read offline
 
   
RESILIA​TM​
 Foundation  
 
Certificate: ​RESILIA​TM​
 Foundation 
Duration: ​3 Days 
Course Delivery: ​Classroom, Virtual 
Classroom 
 
Accreditor:​ AXELOS 
Language: ​English 
Credits:​ AXELOS CPD (2016) 
 
Course Description: 
AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial 
and government organizations around the world prevent, detect and correct any 
impact cyber attacks will have on the information required to do business. Adding 
RESILIA to the existing AXELOS global best practice portfolio, including ITIL​®​
  and 
PRINCE2​®​
,  brings a common cyber resilience best practice for security, IT service 
management and business. Active cyber resilience is achieved through people, 
process and technology.  
 
The RESILIA​TM ​
Foundation course starts with the purpose, key terms, the distinction 
between resilience and security, and the benefits of implementing cyber resilience. It 
introduces risk management and the key activities needed to address risks and 
opportunities. Further, it explains the relevance of common management standards and best 
practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber 
resilience processes, the associated control objectives, interactions and activities that 
should be aligned with corresponding ITSM activities. In the final part of the course, it 
describes the segregation of duties and dual controls related to cyber resilience roles and 
responsibilities. 
 
Audience: 
The RESILIA​TM​
 Foundation course audience includes all teams across the IT and Risk 
functions, including: 
 
● IT Service Management 
Copyright © AXELOS Limited and ITpreneurs 2015 
 
 
○ Operations and Incident management 
○ IT Change & Release management 
○ IT Supplier & Vendor management  
● Business Analysis and Design 
○ Business analysts 
○ IT Architects  
● Development 
● IT Project & Programme Management 
● Risk and Compliance  
○ Information Security management  
○ Business Continuity managers 
 
Learning Objectives: 
Individuals certified at RESILIA​TM​
 Foundation will have demonstrated their knowledge  of: 
● The purpose, benefits, and key terms of cyber resilience. 
● Risk management and the key activities needed to address risks and opportunities. 
● The purpose of a management system and how best practices and standards can 
contribute. 
● Cyber resilience strategy, the associated control objectives, and their interactions with 
ITSM activities. 
● Cyber resilience design, the associated control objectives and their interactions with 
ITSM activities. 
● Cyber resilience transition, the associated control objectives, and their interactions with 
ITSM activities. 
● Cyber resilience operation, the associated control objectives, and their interactions with 
ITSM activities. 
● Cyber resilience continual improvement, the associated control objectives, and their 
interactions with ITSM activities. 
● The purpose and benefits of segregation of duties and dual controls. 
 
Benefits of Taking This Course: 
“This course, for the first time brings together the cyber resilience best practices based on a 
process based life cycle refined, improved and tested over a quarter century to assure success.” 
­ Moyn Uddin, Lead Author of the ITpreneurs RESILIA training program, and Author of the 
RESILIA™: Cyber Resilience Best Practice Guide from AXELOS. 
 
Participants to this course learn about the methods and use of preventative, detective, and 
corrective controls allowing them to recognize risks and to operate effectively in a 
challenging environment. The course provides insights into common management standards 
and best practice frameworks that would assist in making decisions to anticipate, counter 
and/or recover accordingly from cyber­attacks. Participants on completing this course would 
Copyright © AXELOS Limited and ITpreneurs 2015 
 
 
be better positioned in an organization to effectively govern, manage and comply with cyber 
resilience. 
 
Prerequisites:  
There are no prerequisites for this course. 
Follow­on Courses: 
RESILIA​TM ​
Practitioner Course. 
Course Materials: 
Participants receive a copy of the classroom presentation material and a Participant Handbook. 
 
Examination: 
● Syllabus scope: understand and recognize RESILIA™: Cyber Resilience Best Practice 
● Bloom’s level: 1­2 
● Format: Multiple Choice 
● Number of questions: 50 
● Duration: 100 minutes 
● Exam Format: closed book exam 
● Proctoring: Live or Web­proctored 
 
Course​ ​Agenda: 
Day 1  Day 2  Day 3 
M1: Course Introduction  M6: Cyber Resilience Design  M8: Cyber Resilience 
Operation 
M2: Intro to Cyber Resilience  M7: Cyber Resilience 
Transition 
M9: Cyber Resilience 
Continual Improvement 
M3: Risk Management  M8: Cyber Resilience 
Operation 
M10: Cyber Resilience Roles 
and Responsibilities 
M4: Managing Cyber Resilience  End of Day Case Study 
Assignment 
M11: Exam Preparation Guide 
M5: Cyber Resilience Strategy 
M6: Cyber Resilience Design 
End of Day Case Study Assignment 
 
   
Copyright © AXELOS Limited and ITpreneurs 2015 
 
 
Course Outline: 
 
Module 1: Course Introduction 
● Course Learning Objectives 
● Course Agenda 
● Activities 
● Module End Questions 
● Course Book Structure 
● RESILIA Certification 
● Summary 
 
 
Module 2: Introduction to Cyber Resilience 
● What is Cyber Resilience? 
● Module Learning Objectives 
● Module Topics 
● Defining Cyber Resilience 
● Balancing in Cyber Resilience 
● Characteristics of Cyber Resilience 
● Summary 
● End of Module Quiz 
 
  
Module 3: Risk management 
● Understanding Risk Management: Discussion 
● Module Learning Objectives 
● Module Topics 
● Defining Risk Management 
● Addressing Risks and Opportunities 
● Summary 
● End of Module Quiz 
 
  
Module 4: Managing Cyber Resilience  
● Why and What of Management Systems? 
● Module Learning Objectives 
● Module Topics 
● Management Systems 
● Common Management Standards and Frameworks 
● Summary 
● End of Module Quiz 
 
  
Module 5: Cyber Resilience Strategy 
● What is Strategy? 
● Module Learning Objectives 
● Module Topics 
● Cyber Resilience Strategy and Activities 
Copyright © AXELOS Limited and ITpreneurs 2015 
 
 
● Security Controls at Cyber Resilience Strategy 
● Interaction Between ITSM Processes and Cyber Resilience 
● Summary 
● End of Module Quiz 
 
  
Module 6: Cyber Resilience Design 
● Why Cyber Resilience Design? 
● Module Learning Objectives 
● Module Topics 
● Cyber Resilience Design Activities 
● Security Controls at Cyber Resilience Design 
● Aligning ITSM Processes with Cyber Resilience Processes 
● Summary 
● End of Module Quiz 
 
Module 7: Cyber Resilience Transition 
● Why Cyber Resilience Transition? 
● Module Learning Objective 
● Module Topics 
● Basics of Cyber Resilience Transition 
● Cyber Resilience Transition: Controls 
● Interaction Between ITSM Processes and Cyber Resilience 
● Summary 
● End of Module Quiz 
 
  
Module 8: Cyber Resilience Operation 
● The Purpose of Cyber Resilience Operation 
● Module Learning Objectives 
● Module Topics 
● Security Controls in Cyber Resilience Operation 
● Interaction Between IT Processes and Cyber Resilience 
● Interaction Between ITSM Functions and Cyber Resilience 
● Summary 
● End of Module Quiz 
  
Module 9: Cyber Resilience Continual Improvement 
● Continual or Continuous Improvement 
● Module Learning Objectives 
● Module Topics 
● Maturity Models 
● Continual Improvement Controls 
● The Seven­Step Improvement Process 
● The ITIL CSI Approach 
● Summary 
● End of Module Quiz 
 
Copyright © AXELOS Limited and ITpreneurs 2015 
 
 
  
Module 10: Cyber Resilience Roles & responsibilities 
● Module Learning Objectives 
● Module Topics 
● Segregating Duties 
● Dual Controls 
● Summary 
● End of Module Quiz 
 
 
Module 11: Exam Preparation Guide 
● Module Learning Objectives 
● Topics Covered in This Module 
1. Qualification Learning Objectives 
2. Learning Level of the Syllabus 
3. Certification 
4. Exam Instructions 
5. Tips for Taking Exam 
  
 
RESILIA™ is a trade mark of AXELOS Limited, 
All rights reserved. Material is reproduced under licence from AXELOS 
 
Copyright © AXELOS Limited and ITpreneurs 2015 
 
 

More Related Content

Similar to Course Factsheet - AXELOS RESILIA Foundation

MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
elinoraudley582231
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
alinainglis
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
jenkinsmandie
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
ciso_insights
 

Similar to Course Factsheet - AXELOS RESILIA Foundation (20)

MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Strengthening Operational Resilience in Financial Services by Migrating to Go...
Strengthening Operational Resilience in Financial Services by Migrating to Go...Strengthening Operational Resilience in Financial Services by Migrating to Go...
Strengthening Operational Resilience in Financial Services by Migrating to Go...
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
OpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop ExerciseOpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop Exercise
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
apidays Australia 2022 - Guardianship Model - Managing digital hypergrowth at...
 

More from Matt Trigg (9)

MoV syllabus
MoV syllabusMoV syllabus
MoV syllabus
 
MoV foundation sample paper
MoV foundation sample paperMoV foundation sample paper
MoV foundation sample paper
 
Mov foundation sample paper rationales
Mov foundation sample paper   rationalesMov foundation sample paper   rationales
Mov foundation sample paper rationales
 
MoV Foundation sample paper answer key
MoV Foundation sample paper   answer keyMoV Foundation sample paper   answer key
MoV Foundation sample paper answer key
 
En p2 a_prac_2015_samplepaper1&2_scenariobk_v6.0
En p2 a_prac_2015_samplepaper1&2_scenariobk_v6.0En p2 a_prac_2015_samplepaper1&2_scenariobk_v6.0
En p2 a_prac_2015_samplepaper1&2_scenariobk_v6.0
 
En p2 a_prac_2015_samplepaper1_rationale_v6.0
En p2 a_prac_2015_samplepaper1_rationale_v6.0En p2 a_prac_2015_samplepaper1_rationale_v6.0
En p2 a_prac_2015_samplepaper1_rationale_v6.0
 
En p2 a_prac_2015_samplepaper1_questionbk_v6.0
En p2 a_prac_2015_samplepaper1_questionbk_v6.0En p2 a_prac_2015_samplepaper1_questionbk_v6.0
En p2 a_prac_2015_samplepaper1_questionbk_v6.0
 
PRINCE2 Agile Practitioner exam spec_v5.0
PRINCE2 Agile Practitioner exam spec_v5.0PRINCE2 Agile Practitioner exam spec_v5.0
PRINCE2 Agile Practitioner exam spec_v5.0
 
PRINCE2 - Presentation
PRINCE2 - PresentationPRINCE2 - Presentation
PRINCE2 - Presentation
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Course Factsheet - AXELOS RESILIA Foundation