Dora - Digital Operational Resilience Act Complete Training
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.74 GB | Duration: 5h 21m
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.74 GB | Duration: 5h 21m
Learn how to achieve compliance with DORA, enhance operational resilience, and protect your organization!
What you'll learn
Understand the key provisions and requirements of the Digital Operational Resilience Act (DORA).
Develop strategies to enhance operational resilience in your organization.
Learn how to implement DORA-compliant measures for information and communication technology (ICT) systems.
Gain insights into managing risks and meeting regulatory obligations.
Prepare your organization for DORA audits and continuous compliance.
Learn how to achieve compliance with DORA, enhance operational resilience, and protect your organization from regulatory risks.
Requirements
A basic understanding of operational and IT processes within organizations.
Familiarity with regulatory frameworks is helpful but not mandatory.
No specific technical skills required; this course is designed for both technical and non-technical professionals.
Description
Welcome to the Digital Operational Resilience Act (DORA) Training Course!Are you ready to master the regulatory framework that ensures financial institutions maintain robust digital resilience? Whether you are a compliance officer, IT professional, or a financial sector executive, this comprehensive course is designed to equip you with the knowledge and skills to understand and comply with DORA requirements effectively.What You Will Learn:Introduction to DORA: Understand the origins, objectives, and importance of DORA in the financial sector.Key Provisions of DORA: Gain insights into critical components like ICT risk management, incident reporting, and digital resilience testing.ICT Risk Management Frameworks: Learn how to implement effective Information and Communication Technology (ICT) controls aligned with DORA standards.Incident Response and Reporting: Develop practical skills for handling cybersecurity incidents and ensuring timely reporting.Third-Party Risk Management: Understand DORA’s expectations for managing risks associated with ICT third-party providers.Compliance Best Practices: Explore strategies for achieving and maintaining compliance with DORA requirements.Why Take This Course?Comprehensive Curriculum: Covers all key aspects of DORA, from fundamentals to implementation.Expert-Led Training: Learn from industry professionals with hands-on experience in financial regulatory compliance.Practical Insights: Gain actionable strategies and tools to enhance your organization’s digital operational resilience.Career Advancement: Demonstrate your expertise in DORA compliance and strengthen your professional credentials.Who Should Enrol? Compliance Officers and Risk ManagersIT and Cybersecurity ProfessionalsFinancial Sector ExecutivesConsultants and AuditorsAnyone interested in understanding DORA’s impact on digital resilienceCourse Highlights:Video Lectures: Engaging, easy-to-follow video modulesCase Studies: Real-world examples of DORA implementationCertificate of Completion: Showcase your expertise with a verified certificateEnroll Today and Stay Ahead in the Financial SectorThe Digital Operational Resilience Act (DORA) is reshaping how financial institutions approach digital risk. This course provides you with the knowledge and tools to not only comply with these regulations but to thrive in a rapidly evolving landscape.Start your journey to digital resilience today!
Overview
Section 1: Introduction
Lecture 1 Overview of the Digital Operational Resilience Act
Lecture 2 How to get the most out of this course?
Lecture 3 About Trainer
Section 2: DORA Overview
Lecture 4 Understanding DORA and Key Provisions
Lecture 5 DORA Implementation Journey
Section 3: ICT Risk Management Framework
Lecture 6 Cyber Threats on ICT and the Financial Sector
Lecture 7 Understand Risk Management Process
Lecture 8 Risk Profile
Lecture 9 Key Terminologies related to Risk Management
Lecture 10 Risk Identification
Lecture 11 Risk Analysis
Lecture 12 Risk Evaluation and Treatment
Lecture 13 Risk Reporting and Monitoring
Section 4: International and Global Risk Management Frameworks
Lecture 14 NIST Risk Management Framework - RMF
Lecture 15 NIST SP 800-30
Lecture 16 ISO 27005 & ISO 31000
Lecture 17 COBIT Risk Management
Lecture 18 COSO ERM
Section 5: Third Party Risk Management
Lecture 19 Managing ICT Third Party Risk
Lecture 20 Understand Supply Chain Risk Management
Lecture 21 Cloud Computing Contracting
Lecture 22 SOC Audit
Section 6: Operational Security Best Practices Under DORA
Lecture 23 Data Security, Encryption and Key Management Best Practices
Lecture 24 Log Management Process
Lecture 25 Best Practices for Securing the Logs
Lecture 26 Securing ICT Operations
Lecture 27 IAM
Lecture 28 Access Control Concepts
Lecture 29 Access Management Policies
Lecture 30 Network Security Best Practices and Key Requirements Under DORA
Section 7: Administrative Security Measures (HR & Physical Security)
Lecture 31 Personnel Security
Lecture 32 Social Engineering Overview
Lecture 33 Security Awareness and Training
Lecture 34 The importance of Competencies and Resources
Section 8: Information Sharing
Lecture 35 Understand Threat Intelligence & CERT
Lecture 36 Advanced Persistent Threats and Tactics, Techniques and Procedures
Lecture 37 Digital Risk Protection and Brand Protection Overview
Section 9: Continues Monitoring and Evaluation
Lecture 38 Control Evaluation
Lecture 39 SMART Metrics
Lecture 40 Continues Monitoring
IT managers and professionals responsible for operational resilience.,Risk and compliance officers seeking to understand DORA requirements.,Executives and decision-makers in the financial sector.,Consultants and advisors assisting organizations with regulatory compliance.