Dora - The Eu Digital Operational Resilience Act (2024) - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Dora - The Eu Digital Operational Resilience Act (2024) (/Thread-Dora-The-Eu-Digital-Operational-Resilience-Act-2024) |
Dora - The Eu Digital Operational Resilience Act (2024) - mitsumi - 11-22-2024 Dora - The Eu Digital Operational Resilience Act (2024) Published 11/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 394.01 MB | Duration: 2h 15m Learn DORA | Understand the impact and requirements for organizations What you'll learn The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience. ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience. ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as required. ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems. ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents. Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives. Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize risks. Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before deadlines. Requirements Willingness to learn cool stuff! Basic IT Knowledge Description EU Digital Operational Resilience Act (DORA) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master DORA. This course systematically guides you from the basics to advanced concepts of the DORA.Key Benefits for you:The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience within the financial sector.ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as mandated by DORA.ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize systemic risks.Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before enforcement deadlines. Overview Section 1: Introduction Lecture 1 Welcome Lecture 2 FAQs Section 2: DORA - The EU Digital Operational Resilience Act Lecture 3 Cyber Security Challenges Lecture 4 What is DORA? Lecture 5 Impacted Organizations Lecture 6 Key Objectives of DORA Section 3: ICT Risk Management Lecture 7 DORA Requirements for ICT Risk Management Lecture 8 What is Corporate Governance? Lecture 9 What is Enterprise Risk Management? Lecture 10 What is Cyber Security Risk Management? Lecture 11 DORA Implementation Plan: ICT Risk Management Section 4: ICT Third-Party Risk Management Lecture 12 DORA Requirements for ICT Third-Party Risk Management Lecture 13 DORA Implementation Plan: ICT Third-Party Risk Management Section 5: ICT Resilience Testing Lecture 14 DORA Requirements for ICT Resilience Testing Lecture 15 What is a Vulnerability? Lecture 16 Common Vulnerabilities and Exposures (CVE) Lecture 17 Common Vulnerability Scoring System (CVSS) Lecture 18 What is Vulnerability Management? Lecture 19 Identification Lecture 20 Evaluation Lecture 21 Prioritization Lecture 22 Remediation Lecture 23 Reporting Lecture 24 What is Penetration Testing? Lecture 25 Penetration Testing in Cyber Security Lecture 26 Red Teaming vs. Penetration Testing Lecture 27 DORA Implementation Plan: ICT Resilience Testing Section 6: ICT Incident Management Lecture 28 DORA Requirements ICT Incident Management Lecture 29 The NIST Incident Response Process Lecture 30 Preparation Lecture 31 Detection and Analysis Lecture 32 Containment, Eradication and Recovery Lecture 33 Post-Incident Activity Lecture 34 DORA Implementation Plan: ICT Incident Management Section 7: Information Sharing Lecture 35 DORA Requirements for Information Sharing Lecture 36 What is a Threat? Lecture 37 Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI) Lecture 38 What is CTI? Lecture 39 Threat, Vulnerability & Risk Lecture 40 Threat-Informed Defense Lecture 41 Tactics, Techniques & Procedures (TTPs) Lecture 42 IOCs & IOAs Lecture 43 Pyramid of Pain Lecture 44 CTI Sources Lecture 45 DORA Implementation Plan: Information Sharing Section 8: Oversight of Critical Third Party Providers Lecture 46 DORA Requirements for Oversight of Critical Third Party Providers Lecture 47 DORA Implementation Plan: Oversight of Critical Third Party Providers Section 9: Implement DORA Compliance Lecture 48 Steps to implement DORA compliance Lecture 49 Establish a Governance Framework Lecture 50 Conduct a Gap analysis Lecture 51 Implement DORA key objectives Lecture 52 Continous Improvement Section 10: Bonus Lecture 53 Bonus SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler Screenshots Say "Thank You" rapidgator.net: nitroflare.com: ddownload.com: |