Autoplay
Autocomplete
Previous Lesson
Complete and Continue
DORA - Digital Operational Resilience Act Complete Training
Introduction to DORA
DORA Course Introduction - What we will cover? (4:48)
DORA Overview and Significance
Overview of the Digital Operational Resilience Act (8:11)
Cyber Threats on ICT and the Financial Sector (10:38)
Understanding DORA and Key Provisions (11:14)
DORA Implementation Journey (9:27)
Effective Governance and its Impact on DORA Compliance (8:36)
DORA & Unified ICT Risk Management Framework (7:26)
ICT Risk Management Frameworks
Understand Risk Management Process (10:12)
Risk Profile (5:36)
Key Terminologies related to Risk Management (6:50)
Risk Identification (6:48)
Risk Analysis (8:52)
Risk Evaluation and Treatment (12:43)
Risk Reporting and Monitoring (9:23)
International and Global Risk Management Frameworks
NIST Risk Management Framework - RMF (5:58)
NIST SP 800-30 (8:44)
ISO 27005 & ISO 31000 (6:36)
COBIT Risk Management (6:39)
COSO ERM (7:39)
Third-Party Risk Management
Managing ICT Third Party Risk (14:04)
DORA & Third Party Contractors
Understand Supply Chain Risk Management (9:47)
Cloud Computing Contracting (8:26)
SOC Audit (5:11)
Operational Security Best Practices Under DORA
Data Security, Encryption and Key Management Best Practices (6:59)
Log Management Process (9:46)
Best Practices for Securing the Logs (7:05)
Securing ICT Operations (9:15)
IAM (8:46)
Access Control Concepts (5:18)
Access Management Policies (7:55)
Network Security Best Practices and Key Requirements Under DORA (9:05)
Administrative Security Measures (HR & Physical Security)
Personnel Security (11:11)
Social Engineering Overview (10:02)
Security Awareness and Training (4:55)
The importance of Competencies and Resources (6:56)
Physical Security (6:00)
Information Sharing
Information Sharing Arrangements (9:18)
Understand Threat Intelligence & CERT (5:58)
Advanced Persistent Threats and Tactics, Techniques and Procedures (8:06)
Digital Risk Protection and Brand Protection Overview (8:30)
Continues Monitoring and Evaluation
Capacity, Performance and Vulnerability Management (7:36)
Control Evaluation (8:23)
SMART Metrics (5:34)
Continues Monitoring (7:39)
ICT Project Management BEST Practices (8:52)
Incident Management and Continuity and Resiliency Testing
Incident Management Overview (7:09)
Incident Classification Levels (6:43)
Business Continuity and Resiliency Testing Requirements (6:41)
DORA Compliance
The Role of Competent Authorities Under DORA (9:14)
DORA Documentation and Continues Evaluation and Monitoring (9:50)
Micro, Small, Medium Enterprise
DORA Certification and Compliance Process (7:42)
Business Continuity and Resiliency Testing Requirements
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock