Tags
Language
Tags
November 2024
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Dora - The Eu Digital Operational Resilience Act

Posted By: ELK1nG
Dora - The Eu Digital Operational Resilience Act

Dora - The Eu Digital Operational Resilience Act
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 394.01 MB | Duration: 2h 15m

Learn DORA | Understand the impact and requirements for organizations

What you'll learn

The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience.

ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.

ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as required.

ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.

ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.

Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.

Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize risks.

Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before deadlines.

Requirements

Willingness to learn cool stuff!

Basic IT Knowledge

Description

EU Digital Operational Resilience Act (DORA) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master DORA. This course systematically guides you from the basics to advanced concepts of the DORA.Key Benefits for you:The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience within the financial sector.ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as mandated by DORA.ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize systemic risks.Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before enforcement deadlines.

Overview

Section 1: Introduction

Lecture 1 Welcome

Lecture 2 FAQs

Section 2: DORA - The EU Digital Operational Resilience Act

Lecture 3 Cyber Security Challenges

Lecture 4 What is DORA?

Lecture 5 Impacted Organizations

Lecture 6 Key Objectives of DORA

Section 3: ICT Risk Management

Lecture 7 DORA Requirements for ICT Risk Management

Lecture 8 What is Corporate Governance?

Lecture 9 What is Enterprise Risk Management?

Lecture 10 What is Cyber Security Risk Management?

Lecture 11 DORA Implementation Plan: ICT Risk Management

Section 4: ICT Third-Party Risk Management

Lecture 12 DORA Requirements for ICT Third-Party Risk Management

Lecture 13 DORA Implementation Plan: ICT Third-Party Risk Management

Section 5: ICT Resilience Testing

Lecture 14 DORA Requirements for ICT Resilience Testing

Lecture 15 What is a Vulnerability?

Lecture 16 Common Vulnerabilities and Exposures (CVE)

Lecture 17 Common Vulnerability Scoring System (CVSS)

Lecture 18 What is Vulnerability Management?

Lecture 19 Identification

Lecture 20 Evaluation

Lecture 21 Prioritization

Lecture 22 Remediation

Lecture 23 Reporting

Lecture 24 What is Penetration Testing?

Lecture 25 Penetration Testing in Cyber Security

Lecture 26 Red Teaming vs. Penetration Testing

Lecture 27 DORA Implementation Plan: ICT Resilience Testing

Section 6: ICT Incident Management

Lecture 28 DORA Requirements ICT Incident Management

Lecture 29 The NIST Incident Response Process

Lecture 30 Preparation

Lecture 31 Detection and Analysis

Lecture 32 Containment, Eradication and Recovery

Lecture 33 Post-Incident Activity

Lecture 34 DORA Implementation Plan: ICT Incident Management

Section 7: Information Sharing

Lecture 35 DORA Requirements for Information Sharing

Lecture 36 What is a Threat?

Lecture 37 Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI)

Lecture 38 What is CTI?

Lecture 39 Threat, Vulnerability & Risk

Lecture 40 Threat-Informed Defense

Lecture 41 Tactics, Techniques & Procedures (TTPs)

Lecture 42 IOCs & IOAs

Lecture 43 Pyramid of Pain

Lecture 44 CTI Sources

Lecture 45 DORA Implementation Plan: Information Sharing

Section 8: Oversight of Critical Third Party Providers

Lecture 46 DORA Requirements for Oversight of Critical Third Party Providers

Lecture 47 DORA Implementation Plan: Oversight of Critical Third Party Providers

Section 9: Implement DORA Compliance

Lecture 48 Steps to implement DORA compliance

Lecture 49 Establish a Governance Framework

Lecture 50 Conduct a Gap analysis

Lecture 51 Implement DORA key objectives

Lecture 52 Continous Improvement

Section 10: Bonus

Lecture 53 Bonus

SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler