{"title":"DVMS Cyber Resilience","description":"\u003ch2\u003eCyber Security Courses Australia\u003c\/h2\u003e\n\u003cp\u003e\u003ca href=\"\/\"\u003eITSM Hub\u003c\/a\u003e provides cybersecurity courses across Australia. Our training programs are designed to equip IT professionals with the knowledge and skill set required to effectively respond to cyber attacks.\u003c\/p\u003e\n\u003cp\u003eOur training program includes two separate courses designed to implement the skills needed to automate and operationalise the NIST-CSF informative reference controls and management systems that are imperative for delivering business outcomes across a range of industries.\u003c\/p\u003e\n\u003cp\u003eOur training programs require no prerequisites, with the NIST Framework Foundation and Practitioner course running in our virtual classroom or self-paced online.  \u003c\/p\u003e\n\u003ch2\u003eProviding NIST Certification: Foundation course\u003c\/h2\u003e\n\u003cp\u003eITSM Hub’s two-day training program is designed to equip students with the knowledge required to implement cyber security and privacy practices through outreach and effective application of standards and best practices required that are imperative for businesses adopting these capabilities.\u003c\/p\u003e\n\u003cp\u003eStudents will leave the program equipped with a policy framework of computer security guidance for how organisations can effectively prepare for\/respond to attacks. Businesses and individuals enroll in this course to equip them with an effective methodology for assessing and managing cybersecurity outcomes.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eExam \u0026amp; Certification\u003c\/strong\u003e: A closed book, 60 minute, 40 question exam leading to NIST Cybersecurity Framework Foundation Certification, accredited by APMG International.\u003c\/p\u003e\n\u003ch2\u003eWho should enroll in our cyber security course?\u003c\/h2\u003e\n\u003cp\u003eThis course will be highly valuable for any member of an organisation who requires a more profound understanding of the NIST Cybersecurity Framework and how to operationalise its standards.\u003c\/p\u003e\n\u003cp\u003eThis course will help any IT professional and organisation staff equip its organisation with the online defences required to resolve and respond to threats and vulnerabilities.\u003c\/p\u003e\n\u003ch2\u003eHave any questions?\u003c\/h2\u003e\n\u003cp\u003eIf you would like to find out more about our NIST certification courses or would like to discuss enrolling yourself or your team in this training program, please do not hesitate to contact the ITSM Hub professionals.\u003c\/p\u003e\n\u003cp\u003eWe are committed to providing organisations and individuals with a high standard of service and communication and will be happy to provide you with any information you require pre-enrollment.\u003c\/p\u003e\n\u003cp\u003ePlease submit an enquiry form via our \u003ca href=\"\/pages\/contact-us\"\u003econtact page\u003c\/a\u003e and we will reply with all the information you require.\u003c\/p\u003e\n\u003ch3\u003eFAQs\u003c\/h3\u003e\n\u003cdiv data-station-tabs=\"\" data-animate-panels=\"true\" data-default-tab=\"false\" data-layout=\"vertical\" data-open-first-tab=\"false\" data-pro-tabs=\"false\" data-show-global-above=\"false\" data-show-global-below=\"false\" data-start-tab-element=\"h3\"\u003e\n\u003ch3\u003eWhat is the NIST Cybersecurity Framework?\u003c\/h3\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/nist-cyber-security-framework-certification\"\u003eNIST Cyber Security\u003c\/a\u003e Framework is a system to base the creation of policies and procedures on for the purposes of managing risk, security hardening networks, and incident response.\u003c\/p\u003e\n\u003ch3\u003eWho should get NIST certification?\u003c\/h3\u003e\n\u003cp\u003eThe NIST certification is for individuals or teams in any organisations who require a more profound understanding of the NIST Cybersecurity Framework and how to operationalise its standards.\u003c\/p\u003e\n\u003cp\u003eLooking to improve efficiency and reduce operational costs? Our \u003ca href=\"\/pages\/managed-services\"\u003eIT service desk outsourcing\u003c\/a\u003e solutions provide businesses with expert support, allowing your team to focus on core activities while we handle your service desk needs.\u003c\/p\u003e\n\u003c\/div\u003e","products":[{"product_id":"dvms-cyber-resilience-professional-foundation-self-paced-online-certification","title":"DVMS Cyber Resilience Professional Foundation Self-Paced Online Certification","description":"\u003cp\u003e\u003cspan\u003eThe DVMS Cyber Resilience Professional Foundation certification training course is designed to help organisations create a culture-driven, adaptive, cyber-resilient enterprise capable of creating, protecting and delivering business value. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course t\u003c\/span\u003e\u003cspan\u003eeaches ITSM, GRC, and Cybersecurity professionals \u003c\/span\u003ea detailed understanding of the NIST Cybersecurity Framework (NISTCSF) and its role as part of an integrated, adaptive, and culture-driven governance and assurance Digital Value Management System® capable of delivering resilient, compliant, and trusted digital outcomes.\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course is accredited by APMG International and is the first examinable course in a series of DVMS Cyber Resilience Professional training courses.  \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eThis self-paced online course provides you access to your own online learning portal to work through the course materials. Approx. 5-hours of content is included as instructor-led videos and downloadable resources. \u003c\/p\u003e\n\u003ch3\u003eCourse Overview \u0026amp; Learning Outcomes\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eHeld in our virtual classroom with our expert instructor, this course \u003c\/span\u003eintroduces learners to the fundamentals of adopting the NIST Cybersecurity Framework (CSF) and prepares them for the Cyber Resilience Professional Foundation certification. Participants will understand the core concepts of cybersecurity risk, the structure of the NIST-CSF, and how to adopt and adapt the framework to enhance enterprise resilience and improve performance.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eThe program combines lecture material, instructor commentary, and references to the \u003cem\u003eFundamentals of Adopting the NIST Cybersecurity Framework (2nd Edition)\u003c\/em\u003e textbook.\u003c\/p\u003e\n\u003cp\u003eBy the end of the course, participants will be able to:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain fundamental cybersecurity and risk management concepts.\u003c\/li\u003e\n\u003cli\u003eUnderstand the structure, components, and relationships within the NIST-CSF.\u003c\/li\u003e\n\u003cli\u003eApply concepts of organizational culture, privacy, and resiliency to cybersecurity programs.\u003c\/li\u003e\n\u003cli\u003eDescribe how to adopt and adapt the NIST-CSF within a digital enterprise.\u003c\/li\u003e\n\u003cli\u003eRecognise how the DVMS (Digital Value Management System) overlay extends and integrates with the NIST-CSF to drive digital business performance and resilience.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eCourse Modules and Content Outline\u003c\/h3\u003e\n\u003cp\u003e\u003cstrong\u003eModule 1: Imperative \u0026amp; Origin\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the concept of risk.\u003c\/li\u003e\n\u003cli\u003eDifferentiate between threats and vulnerabilities.\u003c\/li\u003e\n\u003cli\u003eUnderstand cybersecurity risk.\u003c\/li\u003e\n\u003cli\u003eReview the NIST-CSF timeline and its origins.\u003c\/li\u003e\n\u003cli\u003eIdentify the benefits of adopting the NIST-CSF.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 2: Framework Structure\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the structure of the NIST-CSF Core.\u003c\/li\u003e\n\u003cli\u003eUnderstand profiles and tiers and their relationships.\u003c\/li\u003e\n\u003cli\u003eLearn to use the NIST-CSF Online Reference tool.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 3: Framework Core\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDescribe the structure and outcomes of the CSF Core.\u003c\/li\u003e\n\u003cli\u003eUnderstand category-level objectives within the framework.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 4: CSF Profiles \u0026amp; CSF Tiers\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the use of CSF Profiles.\u003c\/li\u003e\n\u003cli\u003eDescribe CSF Tiers and their applications.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 5: COSO Enterprise Risk Management (ERM)\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand COSO’s 20 principles in the context of the NIST-CSF.\u003c\/li\u003e\n\u003cli\u003eDiscuss how culture influences organisational risk.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 6: NIST CSF \u0026amp; NIST Privacy Framework\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDescribe the role of a privacy framework.\u003c\/li\u003e\n\u003cli\u003eUnderstand how the NIST Privacy Framework integrates with the CSF.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 7: NIST-CSF and Resiliency\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDefine organisational resiliency in the context of NIST-CSF.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 8: Adopt and Adapt the NIST-CSF\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDescribe the strategic importance of adopting the NIST-CSF.\u003c\/li\u003e\n\u003cli\u003eExplain leadership’s role in commitment and culture curation.\u003c\/li\u003e\n\u003cli\u003eDefine organisational commitment to adoption.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 9: Adopt the NIST-CSF\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDefine “Informative References” (IRs).\u003c\/li\u003e\n\u003cli\u003eDescribe how to adapt IR controls to suit organizational needs.\u003c\/li\u003e\n\u003cli\u003eUnderstand how adaptation enhances organizational resiliency.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 10: Beyond the Framework – DVMS Overlay\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain DVMS overlay concepts.\u003c\/li\u003e\n\u003cli\u003eUnderstand the DVMS Z-X Model and its seven capabilities.\u003c\/li\u003e\n\u003cli\u003eLearn to identify performance gaps using the DVMS overlay.\u003c\/li\u003e\n\u003cli\u003eExplore the DVMS FastTrack™ approach.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eWho should attend\u003c\/h3\u003e\n\u003cp\u003eThe DVMS Foundation course is designed for ITSM, GRC, Cybersecurity, and Business professionals responsible for building and curating a culture trained to create, protect, and deliver organisational digital value and resilience.\u003c\/p\u003e\n\u003ch3\u003eExam \u0026amp; Certification\u003c\/h3\u003e\n\u003cp\u003eThis course prepares you for the closed-book, 60 minute, 40 question exam leading to the DVMS Cyber Resilience Professional Foundation Certification. This exam is administered by APMG International. You must attain a passing mark of 60% (24 marks) to be awarded the certificate.\u003c\/p\u003e\n\u003ch3\u003ePrerequisites\u003c\/h3\u003e\n\u003cp\u003eThere are no pre-requisites for this course.\u003c\/p\u003e\n\u003ch3\u003eCourse Material \u0026amp; Inclusions\u003c\/h3\u003e\n\u003cp\u003eOur self-paced online course provides candidates with access to their own online learning portal for 12-months to work through the course materials and prepare for the examination.\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cspan data-ccp-props=\"{}\"\u003eSelf-Paced Video Learning, \u003c\/span\u003eapprox. 5 hours + resources.\u003c\/li\u003e\n\u003cli\u003eAccess to The Fundamentals of Adopting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/li\u003e\n\u003cli\u003eDVMS Cyber Resilience Professional Foundation Exam Voucher from APMG International.\u003c\/li\u003e\n\u003cli\u003eA digital badge you can share with your network of your course achievement will be provided via email upon passing your certification exam.\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":40206342291640,"sku":"","price":1595.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/DVMS_Cyber_Resilience_Professional_Foundation.png?v=1764284578"},{"product_id":"dvms-cyber-resilience-professional-practitioner-certification","title":"DVMS Cyber Resilience Professional Practitioner Certification","description":"\u003cp\u003e\u003cspan\u003eThe DVMS Cyber Resilience Professional Practitioner \u003c\/span\u003ecourse builds on the Foundation course and teaches participants the skills to transform any best-practice programs into an integrated, adaptive, and culture-driven Digital Value Management Governance and Assurance System®(DVMS) capable of transforming systemic cyber risk into operational resilience.\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThe course develops practitioner-level competencies to transform systemic cyber risk into operational resilience by uniting Fragmented Frameworks and Standards.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course is accredited by APMG Internationals and leads to the DVMS Cyber Resilience Professional Practitioner Certification. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course is delivered by our expert facilitator over 5-day in our virtual classroom, or we can come onsite to your organisation. Request a quote for your team. \u003c\/span\u003e\u003c\/p\u003e\n\u003ch3\u003eCourse Overview \u0026amp; Learning Outcomes\u003c\/h3\u003e\n\u003cp\u003eThis course develops practitioner-level competencies in building a Digital Value Management System® (DVMS) to transform systemic cyber risk into operational resilience by uniting Fragmented Frameworks and Standards—such as NIST, ITSM, GRC, and ISO—into a single, adaptive Governance, Resilience, and Assurance (GRA) operating system that keeps your digital business running, no matter the disruption.\u003c\/p\u003e\n\u003cp\u003eIt builds progressively from mindset and models to systems thinking, governance integration, and continuous improvement, culminating in a capstone synthesis project.\u003c\/p\u003e\n\u003cp\u003eLearners synthesise course concepts—DVMS overlay, CPD, MVC, 3D Knowledge Model, DVCMM, and governance frameworks—into a strategic practitioner plan demonstrating cyber-resilience maturity, cultural awareness, and measurable improvement.\u003cstrong\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003ch3\u003eCourse Modules \u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eModule 1 – Practitioner Foundations\u003c\/strong\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003e1.1 Transitioning to a Practitioner’s Mindset\u003c\/strong\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDifferentiate between compliance-driven and practitioner (strategy-risk-aligned) mindsets.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUnderstand adaptive, proactive decision-making in cybersecurity operations.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIdentify behaviours and mindsets that enable value creation.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003e1.2 The 3D Knowledge Model\u003c\/strong\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDescribe X and Y axes of the model for mapping knowledge and dependencies.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply both axes to enhance decision-making and resilience.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e1.3 3D Knowledge Model: Z-Axis \u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eExplore culture and leadership as drivers of practitioner effectiveness.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEvaluate how culture influences resilience and governance.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDevelop strategies for building generative culture.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e1.4 The Role of Questions\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eFormulate practitioner-level diagnostic and strategic questions.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUse inquiry to uncover hidden risks, dependencies, and assumptions.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEmbed questioning as a foundation for proactive cybersecurity.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e1.5 Strategy-Risk\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eExplain the unity of strategy and risk.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply the space-time analogy to decision-making.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEvaluate the consequences of siloed strategy and risk management.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eModule 2 – Systems Thinking and Operational Integration\u003c\/strong\u003e\u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003e2.1 Systems Thinking Fundamentals\u003c\/strong\u003e\u003c\/span\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eUnderstand system structure, behaviour, and culture in cybersecurity.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply systems tools (causal loops, iceberg, BOT graphs).\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIdentify feedback loops and leverage points for resilience.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.2 Strategy-Risk: Reinforce \u0026amp; Operationalise\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate strategy-risk thinking into daily cybersecurity practices.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDesign cross-functional collaboration processes for alignment.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.3 Deep Dive into the CPD Model\u003c\/strong\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eAnalyse workflows through the CPD (Create-Protect-Deliver) Model.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap assurance loops and feedback mechanisms.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.4 MVC Operationalised by CPD\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDescribe how CPD loops enable Minimum Viable Capabilities (MVC).\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap NIST CSF core functions to CPD and MVC for execution alignment.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.5 Be the Menace\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eApply use and misuse cases to anticipate threats.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate adversarial modeling into assurance and measurement planning.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 3 – Governance, Capabilities, and Measurement\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e3.1 DVMS as a Governance Overlay\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eUnderstand DVMS as a system overlay linking governance, strategy, and execution.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap workflows to MVCs and assess governance loops.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.2 Minimum Viable Capabilities (MVC)\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eExplain and apply the seven MVCs across workflows.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUse the 3D Knowledge Model (Z-axis) to identify cultural barriers.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.3 QO–QM Validation \u0026amp; Metrics\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eApply GQM (Goal–Question–Metric) and QO–QM frameworks.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eAlign metrics with strategic outcomes and continuous improvement.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.4 FastTrack™ Approach\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eSequence capability deployment based on maturity and culture.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUse governance feedback and cultural diagnostics for dynamic adaptation.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.5 Risk Team Structure \u0026amp; Collaboration\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDesign and assess cross-functional risk teams.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate DVMS, MVC, and QO–QM in governance and decision-making.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 4 – Innovation, Maturity, \u0026amp; Adaptation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e4.1 The Four Aspects of Innovation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDistinguish incremental, sustaining, adaptive, and disruptive innovation.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply systems thinking to identify innovation leverage points.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e4.2 Nonlinear Adoption – Revisiting Phases\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eContrast linear and nonlinear adoption models.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap feedback loops that drive adaptation and cultural learning.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e4.3 DVCMM (Digital Value Capability Maturity Model)\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDefine DVCMM levels (0–3) across MVCs.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eBenchmark maturity and link Govern\/Assure to capability deployment.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e4.4 Bridge to Day 5 – Synthesis Preparation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate systems thinking, governance, culture, and measurement.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eFormulate a capstone action plan for cyber resilience improvement.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 5 – Integration, Improvement, and Mastery\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e5.1 Continual Improvement \u0026amp; Innovation Loops\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDesign feedback mechanisms for single- and double-loop learning.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEmbed continuous improvement into operations and culture.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e5.2 Integrating Governance, Measurement, \u0026amp; Culture\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eUnify DVMS governance, GQM\/QO–QM measurement, and cultural diagnostics.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDesign feedback loops for adaptive improvement and resilience.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e5.3 Capstone Synthesis \u0026amp; Practitioner Reflection\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eApply all course models to a real-world cybersecurity challenge.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDevelop an actionable improvement plan aligned with strategy-risk priorities.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eReflect on practitioner growth and continuous learning.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eWho should attend\u003c\/h3\u003e\n\u003cp\u003eThe DVMS Practitioner course is designed for ITSM, GRC, Cybersecurity, and Business professionals responsible for designing, implementing, operating, and continually innovating an integrated, adaptive, and culture-driven Digital Value Management Governance and Assurance System capable of delivering the resilient, compliant, and trusted outcomes government regulators expect.\u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003ePrerequisites\u003c\/h3\u003e\n\u003cp\u003eStudents must have attended and completed the DVMS Cyber Resilience Professional Foundation Certificate, which is a pre-requisite for acceptance on the Practitioner level course.\u003c\/p\u003e\n\u003ch3\u003eExam \u0026amp; Certification\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eThis course prepares you for the open-book exam leading to the DVMS Cyber Resilience Professional Practitioner Certification. Students can choose between the \u003cstrong\u003eImplementer\u003c\/strong\u003e or \u003cstrong\u003eAuditor\u003c\/strong\u003e exam pathway and the relevant exam voucher will be provided. This exam is administered by APMG International. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eQuestions test your ability to apply concepts, analyse scenarios, and evaluate information rather than memorise content. \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cstrong\u003eImplementer\u003c\/strong\u003e - evaluates one’s knowledge of operationalising a DVMS Cyber Resilience Professional program that is fit for use within an organisation and is in alignment with organisational strategic policies.\u003c\/li\u003e\n\u003cli\u003e\n\u003cstrong\u003eAuditor\u003c\/strong\u003e - evaluates one’s knowledge of ensuring that a DVMS Cyber Resilience Professional program delivers the desired business and regulatory outcomes expected by executive leadership and government regulators.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eExam Format:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli style=\"list-style-type: none;\"\u003e\n\u003cul\u003e\n\u003cli\u003eOnline, proctored\u003c\/li\u003e\n\u003cli\u003eDuration 150-minute (2.5 hours)\u003c\/li\u003e\n\u003cli\u003e65 multiple choice questions per exam\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003ePass Mark – 62% (39 marks)\u003c\/li\u003e\n\u003cli\u003eOpen book: Course book, slides, and case study materials (unaltered).\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eThe open-book format reflects the real-world nature of professional practice, where information access is available, but critical thinking and application skills are essential for success.\u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003ch3\u003eCourse Material \u0026amp; Inclusions\u003c\/h3\u003e\n\u003cp\u003e\u003cspan data-contrast=\"auto\"\u003eMaterial for this course will only be provided by TSO (The Stationary Office) and can be viewed on a variety of devices. \u003c\/span\u003e\u003cspan data-ccp-props=\"{}\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eOne year of access to digital courseware\u003c\/li\u003e\n\u003cli\u003eAccess to The Fundamentals of Adopting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/li\u003e\n\u003cli\u003eAccess to A Practitioner’s Guide to Adapting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/li\u003e\n\u003cli\u003eDVMS Cyber Resilience Professional Practitioner Exam Voucher (implementer or auditor) from APMG International.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eA digital badge you can share with your network of your course achievement will be provided via email upon passing your certification exam.\u003c\/p\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":42406468157624,"sku":"","price":6495.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/NIST_Practitioner_Implementer.png?v=1749538757"},{"product_id":"dvms-cyber-resilience-professional-foundation-certification","title":"DVMS Cyber Resilience Professional Foundation Certification","description":"\u003cp\u003e\u003cspan\u003eThe DVMS Cyber Resilience Professional Foundation certification training course is designed to help organisations create a culture-driven, adaptive, cyber-resilient enterprise capable of creating, protecting and delivering business value. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course t\u003c\/span\u003e\u003cspan\u003eeaches ITSM, GRC, and Cybersecurity professionals \u003c\/span\u003ea detailed understanding of the NIST Cybersecurity Framework (NISTCSF) and its role as part of an integrated, adaptive, and culture-driven governance and assurance Digital Value Management System® capable of delivering resilient, compliant, and trusted digital outcomes.\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course is accredited by APMG International and is the first examinable course in a series of DVMS Cyber Resilience Professional training courses.  \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course is delivered over 2-day in our virtual classroom, or we can come onsite to your organisation. Request a quote for your team. \u003c\/span\u003e\u003c\/p\u003e\n\u003ch3\u003eCourse Overview \u0026amp; Learning Outcomes\u003c\/h3\u003e\n\u003cp\u003eHeld in our virtual classroom with our expert instructor, this course introduces learners to the fundamentals of adopting the NIST Cybersecurity Framework (CSF) and prepares them for the Cyber Resilience Professional Foundation certification. Participants will understand the core concepts of cybersecurity risk, the structure of the NIST-CSF, and how to adopt and adapt the framework to enhance enterprise resilience and improve performance.\u003c\/p\u003e\n\u003cp\u003eThe program combines lecture material, instructor commentary, and references to the \u003cem\u003eFundamentals of Adopting the NIST Cybersecurity Framework (2nd Edition) \u003c\/em\u003etextbook.\u003c\/p\u003e\n\u003cp\u003eBy the end of the course, participants will be able to:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain fundamental cybersecurity and risk management concepts.\u003c\/li\u003e\n\u003cli\u003eUnderstand the structure, components, and relationships within the NIST-CSF.\u003c\/li\u003e\n\u003cli\u003eApply concepts of organizational culture, privacy, and resiliency to cybersecurity programs.\u003c\/li\u003e\n\u003cli\u003eDescribe how to adopt and adapt the NIST-CSF within a digital enterprise.\u003c\/li\u003e\n\u003cli\u003eRecognise how the DVMS (Digital Value Management System) overlay extends and integrates with the NIST-CSF to drive digital business performance and resilience.\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eCourse Modules \u0026amp; Content Outline\u003c\/h3\u003e\n\u003cp\u003e\u003cstrong\u003eModule 1: Imperative \u0026amp; Origin\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the concept of risk.\u003c\/li\u003e\n\u003cli\u003eDifferentiate between threats and vulnerabilities.\u003c\/li\u003e\n\u003cli\u003eUnderstand cybersecurity risk.\u003c\/li\u003e\n\u003cli\u003eReview the NIST-CSF timeline and its origins.\u003c\/li\u003e\n\u003cli\u003eIdentify the benefits of adopting the NIST-CSF.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 2: Framework Structure\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the structure of the NIST-CSF Core.\u003c\/li\u003e\n\u003cli\u003eUnderstand profiles and tiers and their relationships.\u003c\/li\u003e\n\u003cli\u003eLearn to use the NIST-CSF Online Reference tool.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 3: Framework Core\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDescribe the structure and outcomes of the CSF Core.\u003c\/li\u003e\n\u003cli\u003eUnderstand category-level objectives within the framework.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 4: CSF Profiles \u0026amp; CSF Tiers\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the use of CSF Profiles.\u003c\/li\u003e\n\u003cli\u003eDescribe CSF Tiers and their applications.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 5: COSO Enterprise Risk Management (ERM)\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand COSO’s 20 principles in the context of the NIST-CSF.\u003c\/li\u003e\n\u003cli\u003eDiscuss how culture influences organisational risk.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 6: NIST CSF \u0026amp; NIST Privacy Framework\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDescribe the role of a privacy framework.\u003c\/li\u003e\n\u003cli\u003eUnderstand how the NIST Privacy Framework integrates with the CSF.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 7: NIST-CSF and Resiliency\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDefine organisational resiliency in the context of NIST-CSF.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 8: Adopt and Adapt the NIST-CSF\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDescribe the strategic importance of adopting the NIST-CSF.\u003c\/li\u003e\n\u003cli\u003eExplain leadership’s role in commitment and culture curation.\u003c\/li\u003e\n\u003cli\u003eDefine organisational commitment to adoption.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 9: Adopt the NIST-CSF\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDefine “Informative References” (IRs).\u003c\/li\u003e\n\u003cli\u003eDescribe how to adapt IR controls to suit organizational needs.\u003c\/li\u003e\n\u003cli\u003eUnderstand how adaptation enhances organizational resiliency.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 10: Beyond the Framework – DVMS Overlay\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain DVMS overlay concepts.\u003c\/li\u003e\n\u003cli\u003eUnderstand the DVMS Z-X Model and its seven capabilities.\u003c\/li\u003e\n\u003cli\u003eLearn to identify performance gaps using the DVMS overlay.\u003c\/li\u003e\n\u003cli\u003eExplore the DVMS FastTrack™ approach.\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eWho should attend\u003c\/h3\u003e\n\u003cp\u003eThe DVMS Foundation course is designed for ITSM, GRC, Cybersecurity, and Business professionals responsible for building and curating a culture trained to create, protect, and deliver organisational digital value and resilience.\u003c\/p\u003e\n\u003ch3\u003eExam \u0026amp; Certification\u003c\/h3\u003e\n\u003cp\u003eThis course prepares you for the closed-book, 60 minute, 40 question exam leading to the DVMS Cyber Resilience Professional Foundation Certification. This exam is administered by APMG International. You must attain a passing mark of 60% (24 marks) to be awarded the certificate. \u003c\/p\u003e\n\u003ch3\u003ePrerequisites\u003c\/h3\u003e\n\u003cp\u003eThere are no pre-requisites for this course.\u003c\/p\u003e\n\u003ch3\u003eCourse Material \u0026amp; Inclusions\u003c\/h3\u003e\n\u003cp\u003e\u003cspan data-contrast=\"auto\"\u003eMaterial for this course will be provided by TSO (The Stationary Office) and can be viewed on a variety of devices. \u003c\/span\u003e\u003cspan data-ccp-props=\"{}\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eOne year of access to digital courseware\u003c\/li\u003e\n\u003cli\u003eAccess to The Fundamentals of Adopting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/li\u003e\n\u003cli\u003eDVMS Cyber Resilience Professional Foundation Exam Voucher from APMG International.\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eA digital badge you can share with your network of your course achievement will be provided via email upon passing your certification exam.\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":42229824815288,"sku":"","price":3495.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/DVMS_Cyber_Resilience_Professional_Foundation_1.png?v=1761018952"},{"product_id":"dvms-cyber-resilience-professional-practitioner-self-paced-online-certification","title":"DVMS Cyber Resilience Professional Practitioner Self-Paced Online Certification","description":"\u003cp\u003e\u003cspan\u003eThe DVMS Cyber Resilience Professional Practitioner \u003c\/span\u003ecourse builds on the Foundation course and teaches participants the skills to transform any best-practice programs into an integrated, adaptive, and culture-driven Digital Value Management Governance and Assurance System®(DVMS) capable of transforming systemic cyber risk into operational resilience.\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThe course develops practitioner-level competencies to transform systemic cyber risk into operational resilience by uniting Fragmented Frameworks and Standards.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis course is accredited by APMG Internationals and leads to the DVMS Cyber Resilience Professional Practitioner Certification. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis self-paced online course provides you access to your own online learning portal to work through the course materials. Approx. 16-hours of content is included as instructor-led videos and downloadable resources. \u003c\/span\u003e\u003c\/p\u003e\n\u003ch3\u003eCourse Overview \u0026amp; Learning Outcomes\u003c\/h3\u003e\n\u003cp\u003eThis course develops practitioner-level competencies in building a Digital Value Management System® (DVMS) to transform systemic cyber risk into operational resilience by uniting Fragmented Frameworks and Standards, such as NIST, ITSM, GRC, and ISO into a single, adaptive Governance, Resilience, and Assurance (GRA) operating system that keeps your digital business running, no matter the disruption.\u003c\/p\u003e\n\u003cp\u003eIt builds progressively from mindset and models to systems thinking, governance integration, and continuous improvement, culminating in a capstone synthesis project.\u003c\/p\u003e\n\u003cp\u003eLearners synthesise course concepts; DVMS overlay, CPD, MVC, 3D Knowledge Model, DVCMM, and governance frameworks into a strategic practitioner plan demonstrating cyber-resilience maturity, cultural awareness, and measurable improvement.\u003cstrong\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003ch3\u003eCourse Modules\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eModule 1 – Practitioner Foundations\u003c\/strong\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003e1.1 Transitioning to a Practitioner’s Mindset\u003c\/strong\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDifferentiate between compliance-driven and practitioner (strategy-risk-aligned) mindsets.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUnderstand adaptive, proactive decision-making in cybersecurity operations.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIdentify behaviours and mindsets that enable value creation.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003e1.2 The 3D Knowledge Model\u003c\/strong\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDescribe X and Y axes of the model for mapping knowledge and dependencies.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply both axes to enhance decision-making and resilience.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e1.3 3D Knowledge Model: Z-Axis \u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eExplore culture and leadership as drivers of practitioner effectiveness.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEvaluate how culture influences resilience and governance.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDevelop strategies for building generative culture.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e1.4 The Role of Questions\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eFormulate practitioner-level diagnostic and strategic questions.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUse inquiry to uncover hidden risks, dependencies, and assumptions.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEmbed questioning as a foundation for proactive cybersecurity.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e1.5 Strategy-Risk\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eExplain the unity of strategy and risk.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply the space-time analogy to decision-making.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEvaluate the consequences of siloed strategy and risk management.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eModule 2 – Systems Thinking and Operational Integration\u003c\/strong\u003e\u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003e2.1 Systems Thinking Fundamentals\u003c\/strong\u003e\u003c\/span\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eUnderstand system structure, behaviour, and culture in cybersecurity.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply systems tools (causal loops, iceberg, BOT graphs).\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIdentify feedback loops and leverage points for resilience.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.2 Strategy-Risk: Reinforce \u0026amp; Operationalise\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate strategy-risk thinking into daily cybersecurity practices.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDesign cross-functional collaboration processes for alignment.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.3 Deep Dive into the CPD Model\u003c\/strong\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eAnalyse workflows through the CPD (Create-Protect-Deliver) Model.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap assurance loops and feedback mechanisms.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.4 MVC Operationalised by CPD\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDescribe how CPD loops enable Minimum Viable Capabilities (MVC).\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap NIST CSF core functions to CPD and MVC for execution alignment.\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e2.5 Be the Menace\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eApply use and misuse cases to anticipate threats.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate adversarial modeling into assurance and measurement planning.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 3 – Governance, Capabilities, and Measurement\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e3.1 DVMS as a Governance Overlay\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eUnderstand DVMS as a system overlay linking governance, strategy, and execution.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap workflows to MVCs and assess governance loops.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.2 Minimum Viable Capabilities (MVC)\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eExplain and apply the seven MVCs across workflows.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUse the 3D Knowledge Model (Z-axis) to identify cultural barriers.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.3 QO–QM Validation \u0026amp; Metrics\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eApply GQM (Goal–Question–Metric) and QO–QM frameworks.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eAlign metrics with strategic outcomes and continuous improvement.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.4 FastTrack™ Approach\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eSequence capability deployment based on maturity and culture.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eUse governance feedback and cultural diagnostics for dynamic adaptation.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e3.5 Risk Team Structure \u0026amp; Collaboration\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDesign and assess cross-functional risk teams.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate DVMS, MVC, and QO–QM in governance and decision-making.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 4 – Innovation, Maturity, \u0026amp; Adaptation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e4.1 The Four Aspects of Innovation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDistinguish incremental, sustaining, adaptive, and disruptive innovation.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eApply systems thinking to identify innovation leverage points.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e4.2 Nonlinear Adoption – Revisiting Phases\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eContrast linear and nonlinear adoption models.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eMap feedback loops that drive adaptation and cultural learning.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e4.3 DVCMM (Digital Value Capability Maturity Model)\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDefine DVCMM levels (0–3) across MVCs.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eBenchmark maturity and link Govern\/Assure to capability deployment.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e4.4 Bridge to Day 5 – Synthesis Preparation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eIntegrate systems thinking, governance, culture, and measurement.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eFormulate a capstone action plan for cyber resilience improvement.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 5 – Integration, Improvement, and Mastery\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e5.1 Continual Improvement \u0026amp; Innovation Loops\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eDesign feedback mechanisms for single- and double-loop learning.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eEmbed continuous improvement into operations and culture.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e5.2 Integrating Governance, Measurement, \u0026amp; Culture\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eUnify DVMS governance, GQM\/QO–QM measurement, and cultural diagnostics.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDesign feedback loops for adaptive improvement and resilience.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003e5.3 Capstone Synthesis \u0026amp; Practitioner Reflection\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eApply all course models to a real-world cybersecurity challenge.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eDevelop an actionable improvement plan aligned with strategy-risk priorities.\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eReflect on practitioner growth and continuous learning.\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eWho should attend\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eThe DVMS Practitioner course is designed for ITSM, GRC, Cybersecurity, and Business professionals responsible for designing, implementing, operating, and continually innovating an integrated, adaptive, and culture-driven Digital Value Management Governance and Assurance System capable of delivering the resilient, compliant, and trusted outcomes government regulators expect.\u003c\/span\u003e\u003c\/p\u003e\n\u003ch3\u003ePrerequisites\u003c\/h3\u003e\n\u003cp\u003eStudents must have attended and completed the DVMS Cyber Resilience Professional Foundation Certificate, which is a pre-requisite for acceptance on the Practitioner level course.\u003c\/p\u003e\n\u003ch3\u003eExam \u0026amp; Certification\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eThis course prepares you for the open-book exam leading to the DVMS Cyber Resilience Professional Practitioner Certification. Students can choose between the \u003cstrong\u003eImplementer\u003c\/strong\u003e or \u003cstrong\u003eAuditor\u003c\/strong\u003e exam pathway and the relevant exam voucher will be provided. This exam is administered by APMG International. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eQuestions test your ability to apply concepts, analyse scenarios, and evaluate information rather than memorise content. \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cstrong\u003eImplementer\u003c\/strong\u003e - evaluates one’s knowledge of operationalising a DVMS Cyber Resilience Professional program that is fit for use within an organisation and is in alignment with organisational strategic policies.\u003c\/li\u003e\n\u003cli\u003e\n\u003cstrong\u003eAuditor\u003c\/strong\u003e - evaluates one’s knowledge of ensuring that a DVMS Cyber Resilience Professional program delivers the desired business and regulatory outcomes expected by executive leadership and government regulators.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eExam Format:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli style=\"list-style-type: none;\"\u003e\n\u003cul\u003e\n\u003cli\u003eOnline, proctored\u003c\/li\u003e\n\u003cli\u003eDuration 150-minute (2.5 hours)\u003c\/li\u003e\n\u003cli\u003e65 multiple choice questions per exam\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003ePass Mark – 62% (39 marks)\u003c\/li\u003e\n\u003cli\u003eOpen book: Course book, slides, and case study materials (unaltered).\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eThe open-book format reflects the real-world nature of professional practice, where information access is available, but critical thinking and application skills are essential for success.\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003ch3\u003eCourse Material \u0026amp; Inclusions\u003c\/h3\u003e\n\u003cp\u003eOur self-paced online course provides candidates with access to their own online learning portal for 12 months to work through the course materials and prepare for the examination. \u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cspan data-ccp-props=\"{}\"\u003eSelf-Paced Video Learning, \u003c\/span\u003eapprox. 16 hours + resources.\u003c\/li\u003e\n\u003cli\u003eAccess to The Fundamentals of Adopting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/li\u003e\n\u003cli\u003eAccess to A Practitioner’s Guide to Adapting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/li\u003e\n\u003cli\u003eDVMS Cyber Resilience Professional Foundation Exam Voucher (implementer or auditor) from APMG International.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eA digital badge you can share with your network of your course achievement will be provided via email upon passing your certification exam.\u003c\/p\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":41680364798136,"sku":"","price":4895.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/NISTPRC_SPO.png?v=1749538757"},{"product_id":"dvms-cyber-resilience-professional-awareness","title":"DVMS Cyber Resilience Professional Awareness","description":"\u003cp\u003eThe DVMS Professional® Digital Business Risk Awareness course teaches participants\u003cspan\u003e the fundamentals of digital business, its risks, and their role in creating, protecting, and delivering resilient digital business value.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis Awareness course will cover:\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003ethe evolving cyber threat landscape\u003c\/li\u003e\n\u003cli\u003ethe fundamentals of business risk\u003c\/li\u003e\n\u003cli\u003eand how organisations can adopt and adapt the NIST Cybersecurity Framework (NIST CSF) to create a culture-driven, cyber-resilient enterprise.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eThis course is delivered over 1-day in our virtual classroom, or we can come onsite to your organisation. Request a quote for your team. \u003c\/p\u003e\n\u003ch3\u003eCourse Overview \u0026amp; Learning Outcomes\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003eIn today’s digital-first economy, every employee plays a role in securing the value of digital business services. Cybersecurity is not just an IT problem—it is a strategic and cultural imperative.\u003c\/p\u003e\n\u003cp\u003eThis foundational program is the first in the DVMS Professional® training series, preparing participants to understand digital business risk and the shared responsibility of protecting organisational value. Key takeaways include;\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDigital evolution is both an opportunity and a source of risk.\u003c\/li\u003e\n\u003cli\u003eCybersecurity must be reframed as a business enabler.\u003c\/li\u003e\n\u003cli\u003eThe NIST Cybersecurity Framework provides a common language for resilience.\u003c\/li\u003e\n\u003cli\u003eCulture, leadership, and practice—not technology alone—drive organisational protection of digital value.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eBy the end of the course, participants will be able to:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain what it means to “become digital” and how digital evolution increases risk.\u003c\/li\u003e\n\u003cli\u003eRecognise the components of cyber risk—threats, vulnerabilities, assets, and controls.\u003c\/li\u003e\n\u003cli\u003eUnderstand the basics of risk assessment and the role of frameworks like NIST CSF.\u003c\/li\u003e\n\u003cli\u003eDescribe how cybersecurity enables business value rather than restricts it.\u003c\/li\u003e\n\u003cli\u003eAppreciate the importance of culture and leadership in building resilience.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eCourse Structure\u003c\/h3\u003e\n\u003cp\u003e\u003cstrong\u003eChapter 1 – Digital Business Evolution\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFrom industrial to digital enterprise\u003c\/li\u003e\n\u003cli\u003eThe digital mindset and expanding threat surface\u003c\/li\u003e\n\u003cli\u003eHow leadership must adapt in the digital age\u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eChapter 2 – Digital Business Risk \u0026amp; Cybersecurity\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eWhat cyber risk is and why it matters to business\u003c\/li\u003e\n\u003cli\u003eThreats, vulnerabilities, assets, and controls\u003c\/li\u003e\n\u003cli\u003eBasics of risk assessment and the Cyber Kill Chain™\u003c\/li\u003e\n\u003cli\u003eWhy cybersecurity is a business opportunity, not just an IT challenge\u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eChapter 3 – Adopting \u0026amp; Adapting the NIST Cybersecurity Framework\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eRole of NIST CSF in digital evolution\u003c\/li\u003e\n\u003cli\u003eThe six functions: Govern, Identify, Protect, Detect, Respond, Recover\u003c\/li\u003e\n\u003cli\u003eAdoption as a strategic decision; adaptation as a cultural discipline\u003c\/li\u003e\n\u003cli\u003eHow to embed continual improvement into the organisation\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eWho should attend\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eThis course is designed for employees at all levels who:\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eContribute to the creation, protection, or delivery of digital services\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eNeed a practical understanding of cybersecurity as business risk\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eWant to become part of a culture of resilience within their organisation\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003ePre-requisites\u003c\/h3\u003e\n\u003cp\u003eThere are no pre-requisites for this Awareness course.\u003c\/p\u003e\n\u003ch3\u003eCourse Material \u0026amp; Inclusions\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003e\u003cspan data-contrast=\"auto\"\u003eMaterial for this course will be provided by TSO (The Stationary Office) and can be viewed on a variety of devices. \u003c\/span\u003e\u003cspan data-ccp-props=\"{}\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan data-ccp-props=\"{}\"\u003eOne year of access to digital courseware\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\n\u003cspan data-ccp-props=\"{}\"\u003eAccess to The Fundamentals of Adopting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/span\u003e\u003cspan data-ccp-props=\"{}\"\u003e\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli\u003e\u003cspan data-ccp-props=\"{}\"\u003eDigital Badge: Earn your DVMS Professional® recognition and share your achievement\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\n\u003cspan data-ccp-props=\"{}\"\u003eMentoring Community: Access to the DVMS NIST Cybersecurity Framework Community of Practice on LinkedIn\u003c\/span\u003e\u003cspan data-ccp-props=\"{}\"\u003e\u003c\/span\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":42229824094392,"sku":"","price":1295.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/Cyber-Resilience_Awareness_2025_600x400_1.png?v=1761019023"},{"product_id":"free-nist-cybersecurity-framework-nist-csf-training","title":"FREE NIST Cybersecurity Framework (NIST-CSF) Training","description":"\u003cp\u003eITSM Hub are partnered with the DVMS Institute and APMG International for our NIST Cybersecurity courses. DVMS Institute are offering a free training video to help individuals understand the critical differences between NIST Cybersecurity Framework versions 1.1 and 2.0.\u003c\/p\u003e\n\u003cp\u003eThis video training is your starting point to understand how the NIST Cybersecurity Framework 2.0 will help your organisation begin its journey to create a culture capable of mitigating digital risk to protect organisational digital business performance, resilience, and trust.\u003c\/p\u003e\n\u003cblockquote\u003e\n\u003cp data-olk-copy-source=\"MessageBody\"\u003e\u003cem\u003e\"I must say it was an exceptional experience. The video was highly informative, engaging, and well-structured, offering valuable insights into NIST’s principles and best practices.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003eI appreciate how clearly the content was presented, making complex cybersecurity concepts easy to understand and applicable to real-world scenarios.\"\u003c\/em\u003e\u003c\/p\u003e\n\u003c\/blockquote\u003e\n\u003cp\u003eOnce you complete the video training, please respond to your email confirmation\u003cspan\u003e \u003c\/span\u003eto receive a digital badge for completing this course that you can add to your LinkedIn profile and share on social media.\u003c\/p\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eITSM Hub is partnered with DVMS Institute to offer the\u003cspan\u003e \u003c\/span\u003e\u003ca href=\"\/collections\/nist-cyber-security-framework-certification\"\u003e\u003cstrong\u003e\u003cb\u003eAccredited NIST Cybersecurity Framework Certification Training Programs\u003c\/b\u003e\u003c\/strong\u003e\u003c\/a\u003e. These courses and certifications\u003cspan\u003e \u003c\/span\u003ewill take you on the next phase of your journey, teaching your HOW” to operationalise the NIST-CSF across your enterprise and supply chain to deliver the secure, resilient, and auditable digital outcomes government regulators expect.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eRegister for access to the free training video, if you have any questions, please reach out to the ITSM Hub team. \u003c\/span\u003e\u003c\/p\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":48498181734584,"sku":null,"price":0.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/NIST_FREE.png?v=1749538882"},{"product_id":"dvms-cyber-resilience-professional-awareness-self-paced-online","title":"DVMS Cyber Resilience Professional Awareness Self-Paced Online","description":"\u003cp\u003eThe DVMS Professional® Digital Business Risk Awareness course teaches participants\u003cspan\u003e the fundamentals of digital business, its risks, and their role in creating, protecting, and delivering resilient digital business value.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis Awareness course will cover:\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003ethe evolving cyber threat landscape\u003c\/li\u003e\n\u003cli\u003ethe fundamentals of business risk\u003c\/li\u003e\n\u003cli\u003eand how organisations can adopt and adapt the NIST Cybersecurity Framework (NIST CSF) to create a culture-driven, cyber-resilient enterprise.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eThis self-paced online course provides you access to your own online learning portal to work through the course materials. Approx. 1-hour 15-mins of content is included as instructor-led videos and downloadable resources. \u003c\/p\u003e\n\u003ch3\u003eCourse Overview \u0026amp; Learning Outcomes\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003eIn today’s digital-first economy, every employee plays a role in securing the value of digital business services. Cybersecurity is not just an IT problem—it is a strategic and cultural imperative.\u003c\/p\u003e\n\u003cp\u003eThis foundational program is the first in the DVMS Professional® training series, preparing participants to understand digital business risk and the shared responsibility of protecting organisational value. Key takeaways include;\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDigital evolution is both an opportunity and a source of risk.\u003c\/li\u003e\n\u003cli\u003eCybersecurity must be reframed as a business enabler.\u003c\/li\u003e\n\u003cli\u003eThe NIST Cybersecurity Framework provides a common language for resilience.\u003c\/li\u003e\n\u003cli\u003eCulture, leadership, and practice, not technology alone, drive organisational protection of digital value.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eBy the end of the course, participants will be able to:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain what it means to “become digital” and how digital evolution increases risk.\u003c\/li\u003e\n\u003cli\u003eRecognise the components of cyber risk; threats, vulnerabilities, assets, and controls.\u003c\/li\u003e\n\u003cli\u003eUnderstand the basics of risk assessment and the role of frameworks like NIST CSF.\u003c\/li\u003e\n\u003cli\u003eDescribe how cybersecurity enables business value rather than restricts it.\u003c\/li\u003e\n\u003cli\u003eAppreciate the importance of culture and leadership in building resilience.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eCourse Structure\u003c\/h3\u003e\n\u003cp\u003e\u003cstrong\u003eChapter 1 – Digital Business Evolution\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFrom industrial to digital enterprise\u003c\/li\u003e\n\u003cli\u003eThe digital mindset and expanding threat surface\u003c\/li\u003e\n\u003cli\u003eHow leadership must adapt in the digital age\u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eChapter 2 – Digital Business Risk \u0026amp; Cybersecurity\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eWhat cyber risk is and why it matters to business\u003c\/li\u003e\n\u003cli\u003eThreats, vulnerabilities, assets, and controls\u003c\/li\u003e\n\u003cli\u003eBasics of risk assessment and the Cyber Kill Chain™\u003c\/li\u003e\n\u003cli\u003eWhy cybersecurity is a business opportunity, not just an IT challenge\u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eChapter 3 – Adopting \u0026amp; Adapting the NIST Cybersecurity Framework\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eRole of NIST CSF in digital evolution\u003c\/li\u003e\n\u003cli\u003eThe six functions: Govern, Identify, Protect, Detect, Respond, Recover\u003c\/li\u003e\n\u003cli\u003eAdoption as a strategic decision; adaptation as a cultural discipline\u003c\/li\u003e\n\u003cli\u003eHow to embed continual improvement into the organisation\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003eWho should attend\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003e\u003cspan\u003eThis course is designed for employees at all levels who:\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan\u003eContribute to the creation, protection, or delivery of digital services\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eNeed a practical understanding of cybersecurity as business risk\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eWant to become part of a culture of resilience within their organisation\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch3\u003ePre-requisites\u003c\/h3\u003e\n\u003cp\u003eThere are no pre-requisites for this Awareness course\u003c\/p\u003e\n\u003ch3\u003eCourse Material \u0026amp; Inclusions\u003cbr\u003e\n\u003c\/h3\u003e\n\u003cp\u003e\u003cspan data-contrast=\"auto\"\u003eAccess to your own online learning portal for 12-months to work through the course materials. Material for this course will be provided by TSO (The Stationary Office) and can be viewed on a variety of devices. \u003c\/span\u003e\u003cspan data-ccp-props=\"{}\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan data-ccp-props=\"{}\"\u003eSelf-Paced Video Learning, Approx. 1-hour, 15-mins\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan data-ccp-props=\"{}\"\u003eAccess to The Fundamentals of Adopting the NIST Cybersecurity Framework Body of Knowledge Publication\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan data-ccp-props=\"{}\"\u003eDigital Badge: Earn your DVMS Professional® recognition and share your achievement\u003cbr\u003e\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan data-ccp-props=\"{}\"\u003eMentoring Community: Access to the DVMS NIST Cybersecurity Framework Community of Practice on LinkedIn\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"NIST","offers":[{"title":"Default Title","offer_id":51622691897528,"sku":null,"price":600.0,"currency_code":"AUD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/files\/Cyber-Resilience_Awareness_2025_600x400_d4801364-7d97-4526-9319-ee8a9335494a.png?v=1761016208"}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0586\/6291\/2184\/collections\/iStock-694008266.jpg?v=1631996135","url":"https:\/\/www.itsmhub.com\/collections\/cyber-resilience.oembed","provider":"ITSM Hub","version":"1.0","type":"link"}