Business Continuity Practitioner Training Course
Course Outline
Upon completion of the course, candidates should be able to demonstrate knowledge and understanding of Business Continuity Management principles and techniques.
Key areas include:
- The role and necessity of Business Continuity Management within an organization
- The Business Continuity Management lifecycle
- The essential components of a Business Continuity Management program
- The importance of risk assessment in Business Continuity Management
- The options for developing a Business Continuity Management strategy
- How to prepare and develop plans for Business Continuity Management response
- The need for testing, maintaining, and reviewing plans
- The importance of integrating Business Continuity Management awareness within the organization
Requirements
Relevant work experience in an information technology (IT) or IT-related position
Fundamentals of information security for government
Principles of risk management
Runs with a minimum of 4 + people. For 1-to-1 or private group training, request a quote.
Business Continuity Practitioner Training Course - Booking
Business Continuity Practitioner Training Course - Enquiry
Business Continuity Practitioner - Consultancy Enquiry
Consultancy Enquiry
Testimonials (2)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein
Course - Certified Information System Security Professional (CISSP) CBK Review
Upcoming Courses
Related Courses
AI Security & Governance: Enterprise Implementation
7 HoursCourse Description
This comprehensive course is tailored to address AI security, governance, compliance, and risk management in enterprise settings. It is specifically designed for security professionals, compliance officers, and technology leaders who are responsible for the secure deployment and governance frameworks of AI systems. The curriculum aligns with best practices and standards for government and industry, ensuring participants are well-equipped to manage AI-related risks and ensure compliance with regulatory requirements.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
This program is designed for individuals involved in information security and information assurance, particularly those working in or supporting government agencies.
What will I learn:
Candidates should be able to demonstrate:
- The ways in which managing information risk can bring significant benefits to public sector organizations.
- The ability to explain and effectively utilize terminology related to information risk management for government use.
- How to conduct threat and vulnerability assessments, business impact analyses, and risk assessments within a governmental context.
- An understanding of the principles of controls and risk treatment in government settings.
- The skill to present assessment results in a format that can serve as the foundation for a risk treatment plan tailored for government operations.
- The application of information classification schemes appropriate for government agencies.
Certified Chief Information Security Officer (CCISO)
35 HoursCertified Information System Security Professional (CISSP) CBK Review
35 HoursObjectives:
- To review the main topics covered in the CISSP CBK (Common Body of Knowledge).
- To prepare participants for the CISSP examination.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in US (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites for government use.
- Set up DNS records and SSL certificates in alignment with public sector standards.
- Implement Cloudflare for content delivery and caching to enhance performance for government services.
- Protect their websites from DDoS attacks, ensuring continuity of operations for government.
- Implement firewall rules to restrict traffic to their websites, maintaining security and compliance for government systems.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed as an intensive exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It covers the latest four domains of ISACA’s CRISC syllabus, with a strong emphasis on exam readiness. Participants will receive the Official ISACA CRISC Review Manual and the Question, Answer, and Explanation (Q&A&E) supplement. The Q&A&E is particularly valuable for helping delegates understand the style of questions posed by ISACA, the types of answers expected, and for facilitating rapid assimilation of the material.
The technical skills and practices promoted by ISACA within the CRISC certification are foundational to success in the field. Achieving the CRISC certification demonstrates a high level of expertise and commitment. With an increasing demand for professionals with risk and control knowledge, ISACA’s CRISC certification has become a preferred credential for individuals and organizations globally. The CRISC certification signifies a dedication to serving enterprises and the profession with distinction.
Objectives:
- To assist participants in passing the CRISC examination on their first attempt.
- To signify commitment to serving an enterprise with distinction through the possession of this certification.
- To enable holders of this certification to secure better positions and salaries due to the growing demand for professionals with risk and control expertise.
You will learn:
- How to help enterprises achieve their business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices that CRISC promotes, which are essential for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursManaging Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in US (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, particularly as it pertains to cybersecurity for government.
By the end of this training, participants will be able to:
- Understand the security oversights that can cause significant damage and disruption to a supply chain.
- Decompose complex security issues into manageable and actionable components.
- Address common supply chain vulnerabilities by identifying high-risk areas and collaborating with stakeholders.
- Implement best practices in securing a supply chain for government operations.
- Significantly reduce or eliminate the most significant risks to an organization's supply chain.
Data Breach Management
14 HoursHiTrust Common Security Framework Compliance
14 HoursPECB ISO 27005 Risk Manager
21 HoursBusiness Continuity Management
35 HoursDescription:
This is a 'Practitioner' course that emphasizes practical exercises designed to reinforce the concepts being taught and build participants' confidence in implementing business continuity management. The course also encourages debate and the sharing of knowledge and experience among students. Participants will benefit from the extensive, hands-on experiences of our trainers, who are active experts in business continuity management and ISO 22301:2019 specialists.
Participants will learn how to:
- Explain the necessity of business continuity management (BCM) for all organizations
- Define the business continuity lifecycle
- Manage a business continuity program
- Understand their organization sufficiently to identify mission-critical impact areas
- Determine their organization's business continuity strategy
- Establish a business continuity response
- Exercise, maintain, and review plans
- Embed business continuity within an organization
- Define terms and definitions relevant to business continuity
By the end of the course, participants will have a comprehensive understanding of all key components of business continuity management and be equipped to return to their roles, making significant contributions to the business continuity management process for government.