You must be logged in to take this course → LOGIN | REGISTER NOW
DORA Lead Implementer Course
Course Curriculum
Introduction | |||
Introduction to DORA Lead Implementer Course | 04:00:00 | ||
Module 1 - Introduction to DORA | |||
Introduction to the Module 1 & suggested reading | 00:00:00 | ||
What is DORA? | 00:00:00 | ||
Who needs to comply with DORA | 02:30:00 | ||
Which IT providers need to comply with DORA and how | 00:00:00 | ||
What are DORA-related regulations RTS, CDR, and CIR | 00:00:00 | ||
What are the main requirements specified in DORA | 00:00:00 | ||
DORA implementation steps | 01:30:00 | ||
Writing DORA documentation [CDR 2024/1774 Article 2] | 03:30:00 | ||
Organizing training and awareness [DORA Articles 5, 13, 16, and 30] | 02:30:00 | ||
Penalties and fines [DORA Articles 50, 51, and 54] | 00:00:00 | ||
Related documentation | 00:00:00 | ||
Certification FAQs | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 2 - Key concepts in governance and ICT risk management | |||
Introduction to the Module 2 | 00:00:00 | ||
Governance responsibilities for senior management [DORA Article 5] | 00:00:00 | ||
Key elements of ICT risk management framework [DORA Article 6; CDR 2024/1774 Article 3] | 00:00:00 | ||
Developing top-level information security policy [DORA Article 9; CDR 2024/1774 Article 29] | 00:00:00 | ||
How to write Digital operational resilience strategy [DORA Article 6] | 00:00:00 | ||
Identifying ICT-supported business functions and assets [DORA Article 8; CDR 2024/1774 Article 4] | 00:00:00 | ||
Performing risk assessment [DORA Article 8; CDR 2024/1774 Articles 3 and 5] | 00:00:00 | ||
Learning and evolving [DORA Article 13] | 00:00:00 | ||
Measurement, monitoring, and controlling the ICT systems [DORA Articles 9 and 13; CDR 2024/1774 Articles 2 and 31] | 00:00:00 | ||
Internal audit of ICT risk management framework [DORA Article 6] | 00:00:00 | ||
Follow-up and corrective actions [DORA Articles 6, 13, and 17] | 00:00:00 | ||
Report on the review of ICT risk management framework [DORA Article 6; CDR 2024/1774 Article 27] | 00:00:00 | ||
Main elements of simplified ICT risk management framework [DORA Article 16; CDR 2024/1774 Articles 28 to 41] | 00:00:00 | ||
Related documentation | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 3 - Cybersecurity measures | |||
Introduction to the Module 3 | 00:00:00 | ||
Policies and procedures for ICT operations security [DORA Article 9; CDR 2024/1774 Article 8] | 00:00:00 | ||
Capacity and performance management [DORA Articles 7 and 9; CDR 2024/1774 Article 9] | 00:00:00 | ||
Data and system security [DORA Article 9; CDR 2024/1774 Article 11] | 00:00:00 | ||
Network security management [DORA Article 9; CDR 2024/1774 Article 13] | 00:00:00 | ||
Securing information in transit [CDR 2024/1774 Article 14] | 00:00:00 | ||
Encryption and cryptography [DORA Article 9; CDR 2024/1774 Articles 6 and 7] | 00:00:00 | ||
Human resources policy [DORA Articles 5 and 13, CDR 2024/1774 Article 19] | 00:00:00 | ||
Identity management and authentication [DORA Article 9; CDR 2024/1774 Article 20] | 00:00:00 | ||
Access control [DORA Article 9; CDR 2024/1774 Article 21] | 00:00:00 | ||
Physical and environmental security [CDR 2024/1774 Article 18] | 00:00:00 | ||
ICT systems acquisition, development, and maintenance [CDR 2024/1774 Article 16] | 00:00:00 | ||
ICT project management [CDR 2024/1774 Article 15] | 00:00:00 | ||
ICT change management [DORA Article 9; CDR 2024/1774 Article 17] | 00:00:00 | ||
Related documentation | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 4 - Anomalous activities, vulnerabilities, and incident management | |||
Introduction to the Module 4 | 00:00:00 | ||
Logging [CDR 2024/1774 Article 12] | 00:00:00 | ||
Detecting anomalous activities [DORA Article 10; CDR 2024/1774 Article 23] | 00:00:00 | ||
Vulnerabilities, patch management, and updates [DORA Article 9; CDR 2024/1774 Article 10] | 00:00:00 | ||
Incident management process [DORA Article 17; CDR 2024/1774 Article 22] | 00:00:00 | ||
Classification of ICT incidents and threats [DORA Article 18; CDR 2024/1772 Articles 1 to 10] | 00:00:00 | ||
Reporting major incidents and cyber threats [DORA Article 19] | 00:00:00 | ||
Related documentation | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 5 - Business continuity and resilience testing | |||
Introduction to the Module 5 | 00:00:00 | ||
ICT business continuity policy [DORA Article 11; CDR 2024/1774 Article 24] | 00:00:00 | ||
Business impact analysis, RTO, and RPO [DORA Articles 11 and 12; CDR 2024/1774 Article 24] | 00:00:00 | ||
Backup and restoration of data [DORA Article 12] | 00:00:00 | ||
Secondary processing site [DORA Article 12; CDR 2024/1774 Article 24] | 00:00:00 | ||
ICT response and recovery plans [DORA Article 11; CDR 2024/1774 Article 26] | 00:00:00 | ||
Testing business continuity and recovery plans [DORA Article 11; CDR 2024/1774 Article 25] | 00:00:00 | ||
Crisis management and communication [DORA Articles 11 and 14] | 00:00:00 | ||
Main elements of digital operational resilience testing [DORA Article 24] | 00:00:00 | ||
Resilience testing of ICT tools and systems [DORA Article 25] | 00:00:00 | ||
Threat-led Penetration Testing TLPT [DORA Articles 26 and 27] | 00:00:00 | ||
Related documentation | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 6 - Managing ICT third-party risk | |||
Introduction to the Module 6 | 00:00:00 | ||
Key elements ICT third-party risk management [DORA Article 28; CDR 2024/1773 articles 1 to 4] | 00:00:00 | ||
Selecting critical ICT service providers [DORA Article 31; CDR 2024/1502 Articles 1 to 6] | 00:00:00 | ||
Risk assessment of ICT service providers [DORA Article 29; CDR 2024/1773 articles 5, 6, and 7] | 00:00:00 | ||
Contracts with ICT service providers [DORA Article 30; CDR 2024/1773 Article 8] | 00:00:00 | ||
Register of information [DORA Article 28; CIR 2024/2956] | 00:00:00 | ||
Monitoring, inspection, and audit of ICT service providers [DORA Articles 28 and 30; CDR 2024/1773 Article 9] | 00:00:00 | ||
Exit strategies for ICT services [DORA Article 28; CDR 2024/1773 Article 10] | 00:00:00 | ||
Government oversight of critical ICT service providers [DORA Articles 33 to 43] | 00:00:00 | ||
Related documentation | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 7 - Getting the project approved | |||
Introduction to the Module 7 | 00:00:00 | ||
What is your situation? | 00:00:00 | ||
For consultants: Get more sales meetings with prospects | 00:00:00 | ||
How to get the interest of top management in your project? | 00:00:00 | ||
How to present the project | 00:00:00 | ||
Other techniques for presenting the project | 00:00:00 | ||
For consultants: Writing a great proposal | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 8 - Prepare for the implementation | |||
Introduction to the Module 8 | 00:00:00 | ||
Define the scope of the project | 00:00:00 | ||
Key stages of the project | 00:00:00 | ||
Tips for project management | 00:00:00 | ||
Estimating the project | 00:00:00 | ||
Communication | 00:00:00 | ||
Use of tools | 00:00:00 | ||
Define roles and responsibilities | 00:00:00 | ||
Project manager beware | 00:00:00 | ||
Project documentation | 00:00:00 | ||
Write a Project Plan | 00:00:00 | ||
Kick-off meeting | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 9 - Implementation of a compliance program | |||
Introduction to the Module 9 | 00:00:00 | ||
Executing the project work | 00:00:00 | ||
Work assignment | 00:00:00 | ||
Managing work assignments and resources | 00:00:00 | ||
Enabling smooth project execution | 00:00:00 | ||
Gathering information and recommending changes | 00:00:00 | ||
Introducing documentation and changes in day-to-day use | 00:00:00 | ||
Overcoming the resistance to change | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 10 - Monitor, control and completing the project | |||
Introduction to the Module 10 | 00:00:00 | ||
Verifying and issuing a status report | 00:00:00 | ||
Communication about the project status | 00:00:00 | ||
Monitor and control meeting | 00:00:00 | ||
Internal audit | 00:00:00 | ||
Management review purpose | 00:00:00 | ||
Management review preparation and execution | 00:00:00 | ||
Acceptance and implementation closure | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Module 11 - Maintaining the compliance program | |||
Introduction to the Module 11 | 00:00:00 | ||
Maintaining compliance | 00:00:00 | ||
Improving the compliance program | 00:00:00 | ||
Top management leadership and example | 00:00:00 | ||
Keep the compliance program updated | 00:00:00 | ||
Follow-up on audits | 00:00:00 | ||
Recap quiz | 00:00:00 | ||
Instructions for taking the exam | |||
Instructions for taking the exam and obtaining the certificate | 00:00:00 |