• Home
  • Assessments
    • Organizational Development
      • Business Development
      • Business Processes
      • Corporate Governance
      • Human Resources
      • Six Sigma
    • Audits and Maturity Evaluations
      • Change Management Audit
      • CMMI Appraisal
      • OPM3 (Project, Program, Portfolio) Assessments
      • Procurement / SCM
    • Operational Excellence
      • COBIT 5
      • ITSM
      • Organizational Change
      • Practitioner Competency
  • Consulting
    • Coaching and Mentoring
    • Custom PM Toolkit
    • PMO Implementation
    • Project Remediation / IV&V
    • Organizational Transformation
    • Success Measurement
  • Training
    • Course Calendar
    • Emerging Technologies
      • Big Data
      • Cloud Computing
      • Cyber Resilience
    • IT Governance / Transformation
      • COBIT
    • Project & Program Management
      • Agile
      • PMI Standards
    • Security and Risk Management
      • Cyber Security
    • Service & Operations Management
      • Kepner-Tregoe
      • Lean IT
      • TIPA
    • Solution Development / Deployment
      • ISTQB
  • About Us
    • Affiliations
    • Clients / Case Studies
    • Contact Us
    • Core Team
    • Job Opportunities
    • Services Approach
    • Value Proposition

Call us toll free 1.800.452.7814

info@projectstrategy.com
Project Strategy Consulting Group Project Strategy Consulting Group
  • Home
  • Assessments
    • Organizational Development
      • Business Development
      • Business Processes
      • Corporate Governance
      • Human Resources
      • Six Sigma
    • Audits and Maturity Evaluations
      • Change Management Audit
      • CMMI Appraisal
      • OPM3 (Project, Program, Portfolio) Assessments
      • Procurement / SCM
    • Operational Excellence
      • COBIT 5
      • ITSM
      • Organizational Change
      • Practitioner Competency
  • Consulting
    • Coaching and Mentoring
    • Custom PM Toolkit
    • PMO Implementation
    • Project Remediation / IV&V
    • Organizational Transformation
    • Success Measurement
  • Training
    • Course Calendar
    • Emerging Technologies
      • Big Data
      • Cloud Computing
      • Cyber Resilience
    • IT Governance / Transformation
      • COBIT
    • Project & Program Management
      • Agile
      • PMI Standards
    • Security and Risk Management
      • Cyber Security
    • Service & Operations Management
      • Kepner-Tregoe
      • Lean IT
      • TIPA
    • Solution Development / Deployment
      • ISTQB
  • About Us
    • Affiliations
    • Clients / Case Studies
    • Contact Us
    • Core Team
    • Job Opportunities
    • Services Approach
    • Value Proposition

RESILIA™ FoundationRESILIA-Logo-Large1

Certificate: RESILIA™ Foundation
Duration: 3 days (virtual) classroom
Course Delivery: Classroom, Exam, eBooks
Accreditor: Axelos
Course ID: RESILIA-F
Language: English
PMI® PDUs: 24

PDFicon

Download a PDF of this course here.

AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL®  and PRINCE2®,  brings a common cyber resilience best practice for security, IT service management, and business.  Active cyber resilience is achieved through people, process and technology.

The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities.  Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience.  Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities.  In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.


Audience:
The RESILIA™ Foundation course audience includes all teams across the IT and Risk functions, including:

  • IT Service Management
    • Operations and Incident management
    • IT Change & Release management
    • IT Supplier & Vendor management
  • Business Analysis and Design
    • Business analysts
    • IT Architects
  • Development
  • IT Project & Programme Management
  • Risk and Compliance
    • Information Security management
    • Business Continuity managers


Learning Objectives:
Individuals certified at RESILIA™ Foundation will have demonstrated their knowledge  of:

  • The purpose, benefits, and key terms of cyber resilience.
  • Risk management and the key activities needed to address risks and opportunities.
  • The purpose of a management system and how best practices and standards can contribute.
  • Cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities.
  • Cyber resilience design, the associated control objectives and their interactions with ITSM activities.
  • Cyber resilience transition, the associated control objectives, and their interactions with ITSM activities.
  • Cyber resilience operation, the associated control objectives, and their interactions with ITSM activities.
  • Cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities.
  • The purpose and benefits of segregation of duties and dual controls.


Benefits of Taking This Course:
“This course, for the first time brings together the cyber resilience best practices based on a process based life cycle refined, improved and tested over a quarter century to assure success.” – Moyn Uddin, Lead Author of the RESILIA training program, and Author of the RESILIA™: Cyber Resilience Best Practice Guide from AXELOS.

Participants to this course learn about the methods and use of preventative, detective, and corrective controls allowing them to recognize risks and to operate effectively in a challenging environment. The course provides insights into common management standards and best practice frameworks that would assist in making decisions to anticipate, counter and/or recover accordingly from cyber-attacks. Participants on completing this course would be better positioned in an organization to effectively govern, manage and comply with cyber resilience.

Prerequisites:
There are no prerequisites for this course.

Follow-On Courses:
RESILIA™
 Practitioner Course.

Course Materials:
Participants receive a copy of the classroom presentation material and a Participant Handbook.

Technical Requirements:
For eBooks:

  • Internet is required only for downloading the eBook. The eBooks can be read offline.
  • Available on: Desktop, Laptop, Tablet, SmartPhone, eReader.
  • Recommended PDF reader: Adobe Reader.


Examination:

  • Syllabus scope: understand and recognize RESILIA™: Cyber Resilience Best Practice
  • Bloom’s level: 1-2
  • Format: Multiple Choice
  • Number of questions: 50
  • Duration: 100 minutes
  • Exam Format: closed book exam
  • Proctoring: Live or Web-proctored


Course Agenda:

Day 1

Day 2 Day 3
M1: Course Introduction M6: Cyber Resilience Design M8: Cyber Resilience Operation
M2: Intro to Cyber Resilience M7: Cyber Resilience Transition M9: Cyber Resilience Continual Improvement
M3: Risk Management M8: Cyber Resilience Operation M10: Cyber Resilience Roles and Responsibilities
M4: Managing Cyber Resilience End of Day Case Study Assignment

 

 

 

 

 

M11: Exam Preparation Guide

 

 

 

 

 

M5: Cyber Resilience Strategy

M6: Cyber Resilience Design

End of Day Case Study Assignment

PDFicon

Download a PDF of this course here.

 

Course Outline:

Module 1: Course Introduction

  • Course Learning Objectives
  • Course Agenda
  • Activities
  • Module End Questions
  • Course Book Structure
  • RESILIA Certification
  • Summary

Module 2: Introduction to Cyber Resilience

  • What is Cyber Resilience?
  • Module Learning Objectives
  • Module Topics
  • Defining Cyber Resilience
  • Balancing in Cyber Resilience
  • Characteristics of Cyber Resilience
  • Summary
  • End of Module Quiz

Module 3: Risk management

  • Understanding Risk Management: Discussion
  • Module Learning Objectives
  • Module Topics
  • Defining Risk Management
  • Addressing Risks and Opportunities
  • Summary
  • End of Module Quiz

Module 4: Managing Cyber Resilience

  • Why and What of Management Systems?
  • Module Learning Objectives
  • Module Topics
  • Management Systems
  • Common Management Standards and Frameworks
  • Summary
  • End of Module Quiz

Module 5: Cyber Resilience Strategy

  • What is Strategy?
  • Module Learning Objectives
  • Module Topics
  • Cyber Resilience Strategy and Activities
  • Security Controls at Cyber Resilience Strategy
  • Interaction Between ITSM Processes and Cyber Resilience
  • Summary
  • End of Module Quiz

Module 6: Cyber Resilience Design

  • Why Cyber Resilience Design?
  • Module Learning Objectives
  • Module Topics
  • Cyber Resilience Design Activities
  • Security Controls at Cyber Resilience Design
  • Aligning ITSM Processes with Cyber Resilience Processes
  • Summary
  • End of Module Quiz

Module 7: Cyber Resilience Transition

  • Why Cyber Resilience Transition?
  • Module Learning Objective
  • Module Topics
  • Basics of Cyber Resilience Transition
  • Cyber Resilience Transition: Controls
  • Interaction Between ITSM Processes and Cyber Resilience
  • Summary
  • End of Module Quiz

Module 8: Cyber Resilience Operation

  • The Purpose of Cyber Resilience Operation
  • Module Learning Objectives
  • Module Topics
  • Security Controls in Cyber Resilience Operation
  • Interaction Between IT Processes and Cyber Resilience
  • Interaction Between ITSM Functions and Cyber Resilience
  • Summary
  • End of Module Quiz

Module 9: Cyber Resilience Continual Improvement

  • Continual or Continuous Improvement
  • Module Learning Objectives
  • Module Topics
  • Maturity Models
  • Continual Improvement Controls
  • The Seven-Step Improvement Process
  • The ITIL CSI Approach
  • Summary
  • End of Module Quiz

Module 10: Cyber Resilience Roles & responsibilities

  • Module Learning Objectives
  • Module Topics
  • Segregating Duties
  • Dual Controls
  • Summary
  • End of Module Quiz

Module 11: Exam Preparation Guide

  • Module Learning Objectives
  • Topics Covered in This Module
  1. Qualification Learning Objectives
  2. Learning Level of the Syllabus
  3. Certification
  4. Exam Instructions
  5. Tips for Taking Exam

PDFicon

Download a PDF of this course here.

 

RESILIA™ is a trade mark of AXELOS Limited.  All rights reserved. Material is reproduced under licence from AXELOS.

Find us on

Search

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
Experience the power of a true consulting partner. Contact us to learn more.

CONTACT INFO

Project Strategy Consulting Group

Headquarters:
2834 Adams Street
Suite 200
Alameda CA 94501

Phone: +1 800 452 7814
Email: info@projectstrategy.com

International Offices

UAE/India Office:
P.O. Box 31291
Dubai Media City
Dubai, UAE
Phone: +971 5567 97000

Nigeria Office:
12, Landbridge Avenue, Oniru, Victoria Island, Lagos, Nigeria
Phone: +234 813 4806 886

Affiliations

Logo

© 2025 · The Project Strategy Consulting Group, Inc.

  • Home
  • About Us
  • Contact Us