Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Dora - The Eu Digital Operational Resilience Act

    Posted By: ELK1nG
    Dora - The Eu Digital Operational Resilience Act

    Dora - The Eu Digital Operational Resilience Act
    Published 11/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 394.01 MB | Duration: 2h 15m

    Learn DORA | Understand the impact and requirements for organizations

    What you'll learn

    The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience.

    ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.

    ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as required.

    ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.

    ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.

    Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.

    Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize risks.

    Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before deadlines.

    Requirements

    Willingness to learn cool stuff!

    Basic IT Knowledge

    Description

    EU Digital Operational Resilience Act (DORA) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master DORA. This course systematically guides you from the basics to advanced concepts of the DORA.Key Benefits for you:The EU Digital Operational Resilience Act (DORA): Gain a comprehensive understanding of DORA, its objectives, and its role in enhancing digital resilience within the financial sector.ICT Risk Management under DORA: Learn how to implement effective ICT risk management frameworks that align with DORA's requirements for operational resilience.ICT Third-Party Risk Management in DORA Compliance: Explore strategies to assess and mitigate risks associated with third-party ICT providers as mandated by DORA.ICT Resilience Testing in the DORA Framework: Master the requirements and methodologies for resilience testing outlined in DORA to ensure robust ICT systems.ICT Incident Management in the Context of DORA: Understand how DORA directs the processes for identifying, managing, and reporting ICT-related incidents.Information Sharing under DORA: Discover the importance of secure and effective information sharing to meet DORA's operational resilience objectives.Oversight of Critical Third-Party Providers in DORA: Learn how DORA mandates oversight and monitoring of critical ICT third-party providers to minimize systemic risks.Steps to Prepare for DORA Compliance: Develop a roadmap for achieving DORA compliance, including key steps and strategies to ensure readiness before enforcement deadlines.

    Overview

    Section 1: Introduction

    Lecture 1 Welcome

    Lecture 2 FAQs

    Section 2: DORA - The EU Digital Operational Resilience Act

    Lecture 3 Cyber Security Challenges

    Lecture 4 What is DORA?

    Lecture 5 Impacted Organizations

    Lecture 6 Key Objectives of DORA

    Section 3: ICT Risk Management

    Lecture 7 DORA Requirements for ICT Risk Management

    Lecture 8 What is Corporate Governance?

    Lecture 9 What is Enterprise Risk Management?

    Lecture 10 What is Cyber Security Risk Management?

    Lecture 11 DORA Implementation Plan: ICT Risk Management

    Section 4: ICT Third-Party Risk Management

    Lecture 12 DORA Requirements for ICT Third-Party Risk Management

    Lecture 13 DORA Implementation Plan: ICT Third-Party Risk Management

    Section 5: ICT Resilience Testing

    Lecture 14 DORA Requirements for ICT Resilience Testing

    Lecture 15 What is a Vulnerability?

    Lecture 16 Common Vulnerabilities and Exposures (CVE)

    Lecture 17 Common Vulnerability Scoring System (CVSS)

    Lecture 18 What is Vulnerability Management?

    Lecture 19 Identification

    Lecture 20 Evaluation

    Lecture 21 Prioritization

    Lecture 22 Remediation

    Lecture 23 Reporting

    Lecture 24 What is Penetration Testing?

    Lecture 25 Penetration Testing in Cyber Security

    Lecture 26 Red Teaming vs. Penetration Testing

    Lecture 27 DORA Implementation Plan: ICT Resilience Testing

    Section 6: ICT Incident Management

    Lecture 28 DORA Requirements ICT Incident Management

    Lecture 29 The NIST Incident Response Process

    Lecture 30 Preparation

    Lecture 31 Detection and Analysis

    Lecture 32 Containment, Eradication and Recovery

    Lecture 33 Post-Incident Activity

    Lecture 34 DORA Implementation Plan: ICT Incident Management

    Section 7: Information Sharing

    Lecture 35 DORA Requirements for Information Sharing

    Lecture 36 What is a Threat?

    Lecture 37 Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI)

    Lecture 38 What is CTI?

    Lecture 39 Threat, Vulnerability & Risk

    Lecture 40 Threat-Informed Defense

    Lecture 41 Tactics, Techniques & Procedures (TTPs)

    Lecture 42 IOCs & IOAs

    Lecture 43 Pyramid of Pain

    Lecture 44 CTI Sources

    Lecture 45 DORA Implementation Plan: Information Sharing

    Section 8: Oversight of Critical Third Party Providers

    Lecture 46 DORA Requirements for Oversight of Critical Third Party Providers

    Lecture 47 DORA Implementation Plan: Oversight of Critical Third Party Providers

    Section 9: Implement DORA Compliance

    Lecture 48 Steps to implement DORA compliance

    Lecture 49 Establish a Governance Framework

    Lecture 50 Conduct a Gap analysis

    Lecture 51 Implement DORA key objectives

    Lecture 52 Continous Improvement

    Section 10: Bonus

    Lecture 53 Bonus

    SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler