Dora - The Eu Digital Operational Resilience Act
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 394.01 MB | Duration: 2h 15m
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 394.01 MB | Duration: 2h 15m
Learn DORA | Understand the impact and requirements for organizations
What you'll learn
The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience.
ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.
ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as required.
ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.
ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.
Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.
Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize risks.
Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before deadlines.
Requirements
Willingness to learn cool stuff!
Basic IT Knowledge
Description
EU Digital Operational Resilience Act (DORA) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master DORA. This course systematically guides you from the basics to advanced concepts of the DORA.Key Benefits for you:The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience within the financial sector.ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as mandated by DORA.ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize systemic risks.Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before enforcement deadlines.
Overview
Section 1: Introduction
Lecture 1 Welcome
Lecture 2 FAQs
Section 2: DORA - The EU Digital Operational Resilience Act
Lecture 3 Cyber Security Challenges
Lecture 4 What is DORA?
Lecture 5 Impacted Organizations
Lecture 6 Key Objectives of DORA
Section 3: ICT Risk Management
Lecture 7 DORA Requirements for ICT Risk Management
Lecture 8 What is Corporate Governance?
Lecture 9 What is Enterprise Risk Management?
Lecture 10 What is Cyber Security Risk Management?
Lecture 11 DORA Implementation Plan: ICT Risk Management
Section 4: ICT Third-Party Risk Management
Lecture 12 DORA Requirements for ICT Third-Party Risk Management
Lecture 13 DORA Implementation Plan: ICT Third-Party Risk Management
Section 5: ICT Resilience Testing
Lecture 14 DORA Requirements for ICT Resilience Testing
Lecture 15 What is a Vulnerability?
Lecture 16 Common Vulnerabilities and Exposures (CVE)
Lecture 17 Common Vulnerability Scoring System (CVSS)
Lecture 18 What is Vulnerability Management?
Lecture 19 Identification
Lecture 20 Evaluation
Lecture 21 Prioritization
Lecture 22 Remediation
Lecture 23 Reporting
Lecture 24 What is Penetration Testing?
Lecture 25 Penetration Testing in Cyber Security
Lecture 26 Red Teaming vs. Penetration Testing
Lecture 27 DORA Implementation Plan: ICT Resilience Testing
Section 6: ICT Incident Management
Lecture 28 DORA Requirements ICT Incident Management
Lecture 29 The NIST Incident Response Process
Lecture 30 Preparation
Lecture 31 Detection and Analysis
Lecture 32 Containment, Eradication and Recovery
Lecture 33 Post-Incident Activity
Lecture 34 DORA Implementation Plan: ICT Incident Management
Section 7: Information Sharing
Lecture 35 DORA Requirements for Information Sharing
Lecture 36 What is a Threat?
Lecture 37 Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI)
Lecture 38 What is CTI?
Lecture 39 Threat, Vulnerability & Risk
Lecture 40 Threat-Informed Defense
Lecture 41 Tactics, Techniques & Procedures (TTPs)
Lecture 42 IOCs & IOAs
Lecture 43 Pyramid of Pain
Lecture 44 CTI Sources
Lecture 45 DORA Implementation Plan: Information Sharing
Section 8: Oversight of Critical Third Party Providers
Lecture 46 DORA Requirements for Oversight of Critical Third Party Providers
Lecture 47 DORA Implementation Plan: Oversight of Critical Third Party Providers
Section 9: Implement DORA Compliance
Lecture 48 Steps to implement DORA compliance
Lecture 49 Establish a Governance Framework
Lecture 50 Conduct a Gap analysis
Lecture 51 Implement DORA key objectives
Lecture 52 Continous Improvement
Section 10: Bonus
Lecture 53 Bonus
SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler