Business Continuity Practitioner Training Course
This course is designed to enhance organizational resilience against various threats, ensuring that entities can respond effectively to incidents, maintain the continuity of critical operations, and protect their interests for government and other public sector organizations.
This course is available as onsite live training in US Government or online live training.Course Outline
Upon completion of the course, participants should be able to demonstrate knowledge and understanding of Business Continuity Management principles and techniques.
Key areas include:
- The role and necessity of Business Continuity Management within an organization
- The Business Continuity Management lifecycle
- The core components of a Business Continuity Management program
- The importance of risk assessment in Business Continuity Management
- The various options for developing a Business Continuity Management strategy
- How to prepare and develop plans for Business Continuity Management response
- The necessity of exercising, maintaining, and reviewing these plans
- The importance of integrating Business Continuity Management awareness within the organization
Requirements
Experience in an information technology or related field
Foundational knowledge of information security
Basic understanding of risk management for government
Runs with a minimum of 4 + people. For 1-to-1 or private group training, request a quote.
Business Continuity Practitioner Training Course - Booking
Business Continuity Practitioner Training Course - Enquiry
Business Continuity Practitioner - Consultancy Enquiry
Consultancy Enquiry
Testimonials (2)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein
Course - Certified Information System Security Professional (CISSP) CBK Review
Upcoming Courses
Related Courses
AI Security & Governance: Enterprise Implementation
7 HoursCourse Description
This comprehensive course is designed to address AI security, governance, compliance, and risk management for government implementations. It is tailored for security professionals, compliance officers, and technology leaders responsible for the secure deployment and governance frameworks of AI systems within public sector organizations.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
This training is designed for individuals involved in information security and information assurance roles within government agencies and organizations.
What will I learn:
Candidates should be able to demonstrate the following skills and knowledge:
- The ways in which effective management of information risk can bring significant benefits to government operations.
- The ability to explain and utilize information risk management terminology for government applications.
- How to conduct threat and vulnerability assessments, business impact analyses, and risk assessments for government environments.
- The principles of controls and risk treatment in the context of public sector workflows.
- The skills to present assessment results in a format that can serve as the foundation for a comprehensive risk treatment plan for government use.
- The application of information classification schemes appropriate for government agencies.
Certified Chief Information Security Officer (CCISO)
35 HoursThe EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals across the globe. A distinguished group of high-level information security executives, known as the CCISO Advisory Board, played a crucial role in shaping the foundation of the program. They outlined the content to be covered by the exam, body of knowledge, and training. Members of the Board contributed in various capacities—some as authors, others as exam writers, quality assurance reviewers, and trainers. Each component of the program was designed with the aspiring CISO in mind, aiming to transfer the expertise of seasoned professionals to the next generation, particularly in areas critical for the development and maintenance of a robust information security program.
The Certified Chief Information Security Officer (CCISO) program is the first of its kind, offering training and certification aimed at producing top-tier information security executives. The CCISO program does not focus solely on technical knowledge but emphasizes the application of information security management principles from an executive perspective. Developed by current CISOs for government and aspiring CISOs, this program ensures that participants are well-equipped to lead effective information security strategies.
Certified Information System Security Professional (CISSP) CBK Review
35 HoursA Certified Information Systems Security Professional (CISSP) is an information assurance professional who defines the architecture, design, management, and/or controls that assure the security of business environments. The extensive breadth of knowledge and the experience required to pass the exam distinguish a CISSP. This credential demonstrates a globally recognized level of competence provided by the (ISC)2® Common Body of Knowledge (CBK), which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management, and more.
This course is designed to help participants review the 10 domains of the information security practices. It also serves as a robust learning tool for mastering concepts and topics related to all aspects of information systems security, specifically tailored for government professionals.
Objectives:
- To review the main topics of the CISSP CBK (Common Body of Knowledge).
- To prepare participants for the CISSP examination.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites for government use.
- Set up DNS records and SSL certificates in alignment with public sector standards.
- Implement Cloudflare for content delivery and caching to enhance performance for government services.
- Protect their websites from DDoS attacks, ensuring continuity of operations for government.
- Implement firewall rules to restrict traffic to their websites, maintaining security and compliance for government systems.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This class is designed as an intensive and rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The course will cover the latest four (4) domains of ISACA’s CRISC syllabus, with a strong emphasis on exam readiness. Official ISACA CRISC Review Manual and Question, Answer, and Explanation (Q&A&E) supplements will also be provided to participants. The Q&A&E is particularly effective in helping delegates understand the ISACA style of questions, the type of answers ISACA expects, and it aids in rapid memory assimilation of the material.
The technical skills and practices that ISACA promotes and evaluates within the CRISC certification are essential for success in the field. Obtaining the CRISC certification demonstrates your expertise and commitment to the profession. With a growing demand for professionals with risk and control expertise, ISACA’s CRISC has become the preferred certification program by individuals and organizations around the world. The CRISC certification signifies a dedication to serving an enterprise and the chosen profession with distinction, particularly valuable in the public sector.
Objectives:
- To help you pass the CRISC examination on your first attempt.
- Possessing this certification will signify your commitment to serving an enterprise with distinction, especially for government roles.
- The growing demand for professionals with risk and control skills will allow holders of this certification to command better positions and salaries, including those in public sector organizations.
You will learn:
- To assist enterprises in achieving business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls, particularly for government operations.
- The technical skills and practices that CRISC promotes, which are the building blocks of success in the field, including those relevant to public sector workflows.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, as well as prepare for the CRISC certification exam for government.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT for government operations.
- Conduct IT risk assessments and implement appropriate risk responses within public sector environments.
- Design and implement information systems controls that align with governmental standards and best practices.
- Prepare effectively for the CRISC certification exam, ensuring readiness to apply these skills in a government context.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, particularly as it pertains to cybersecurity for government.
By the end of this training, participants will be able to:
- Understand the security oversights that can cause significant damage and disruption to a supply chain.
- Decompose complex security issues into manageable and actionable components.
- Address common supply chain vulnerabilities by identifying high-risk areas and collaborating with stakeholders.
- Implement best practices in securing a supply chain for government operations.
- Significantly reduce or eliminate the most significant risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at intermediate to advanced IT professionals and business leaders who wish to develop a structured approach to handling data breaches for government.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant for government use.
By the end of this training, participants will be able to:
- Comprehend the core principles of the HiTrust CSF (Common Security Framework).
- Recognize the administrative and security control domains within the HITRUST CSF.
- Gain knowledge about the various types of HiTrust assessments and scoring methodologies.
- Understand the certification process and requirements for achieving HiTrust compliance.
- Acquire best practices and strategies for implementing the HiTrust framework effectively.
PECB ISO 27005 Risk Manager
21 HoursThis training course provides comprehensive instruction on conducting risk assessments for information security by integrating the guidelines from ISO/IEC 27005:2022 and ISO/IEC 27001. In addition to theoretical knowledge, the course includes practical exercises, quizzes, and case studies, making it an engaging and effective learning experience for government professionals.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner' course that emphasizes practical exercises designed to reinforce the concepts being taught and to build delegates’ confidence in implementing business continuity management. The course also encourages debate and the sharing of knowledge and experience among participants. Delegates will benefit from the practical and extensive experiences of Govtra’s trainers, who are practicing business continuity management and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organizations
- Define the business continuity lifecycle
- Conduct business continuity program management
- Understand their organization sufficiently to identify mission-critical impact areas
- Determine their organization's business continuity strategy
- Establish a business continuity response
- Exercise, maintain, and review plans
- Embed business continuity in an organization
- Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all key components of business continuity management and be able to return to their work for government, making a significant contribution to the business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at security engineers who wish to utilize IBM Qradar SIEM to address critical security use cases for government.
By the end of this training, participants will be able to:
- Achieve comprehensive visibility into enterprise data across both on-premises and cloud environments.
- Automate security intelligence processes to effectively hunt threats and mitigate risks.
- Detect, identify, and prioritize potential threats to enhance the security posture of government operations.
Snyk
14 HoursThis instructor-led, live training in US Empire (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to identify and resolve security vulnerabilities in their code for government projects.
By the end of this training, participants will be able to:
- Comprehend the features and architecture of Snyk.
- Utilize Snyk to detect and remediate code security issues.
- Incorporate Snyk into a software development lifecycle for government applications.
Understanding Modern Information Communication Technology
7 HoursThis course provides a comprehensive overview of security fundamentals, including key aspects of IT Security, with a focus on protecting against network threats. Participants will develop an understanding of critical security protocols and the essential security principles governing web services. The curriculum also examines recent attacks on cryptosystems and highlights associated vulnerabilities to enhance preparedness for government.