/ Trainings / DORA Essentials

Digital Operational Resilience Act (DORA) Essentials

  • Training Program

About Course

The TRECCERT DORA Essentials training course provides participants with foundational knowledge of the Digital Operational Resilience Act (DORA) and its role in enhancing IT security and resilience in the financial sector. This course covers essential topics, including risk management, ICT incident reporting, and third-party risk management, equipping professionals to support organizational compliance and operational resilience.

What Makes This Course Unique?

  • Clear explanation of DORA’s objectives and core elements.
  • Practical insights into ICT risk management and resilience strategies.
  • Foundation for understanding compliance with financial sector regulations.

This course is ideal for IT security analysts, compliance officers, and professionals in the financial sector.

Show more Show less

Audience

The TRECCERT DORA Essentials training course is designed for individuals aiming to build a career or contribute to the field of digital operational resilience. This course is ideal for:

  • IT Security Analysts, Managers, Project Managers, or Officers 
  • Cybersecurity Engineers, Quality Assurance Managers, Risk Managers, or Incident Response Team Members
  • Compliance Officers, Regulatory Affairs Specialists, or Internal Auditors
  • Financial Services Professionals, including those in banking, insurance, and asset management sectors

Course Details

Included Materials

What Will You Learn?

Course Content

Introduction to DORA
  • Introduction to Digital Operational Resilience
  • DORA Overview
  • Importance of Digital Resilience in Finance
  • How do ISO Standards Align with DORA?
Risk Management Requirements
  • Risk Management Requirements
Incident Reporting Requirements
  • ICT-related Incident Management Process
  • ICT-related Incidents and Cyber Threats
Digital Operational Resilience Testing Requirements
  • Testing of ICT Tools and Systems Advanced
  • Testing of ICT Tools, Systems, and Processes based on TLPT
  • Requirements for Testers for the Carrying out of TPLP
ICT Third-Party Risk Requirements
  • Management of ICT Third-Party Risk Principles
  • Due Diligence Process for ICT Service Providers
  • Exit-Strategies

Course Details

Included Materials