Digital Operational Resilience Act (DORA)
The Digital Operational Resilience Act (DORA) is a regulatory framework set by the European Union to enhance the cybersecurity and operational resilience of financial institutions.
DORA mandates that financial entities strengthen their defence against digital threats, ensuring that they are well prepared to withstand and recover from cyber incidents.
Our DORA course covers key requirements for ICT risk management, incident reporting, resilience testing, third-party risk management, and information sharing, helping ensure regulatory compliance.
- 25 Minutes
- All staff
- Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.

Learning objectives
- Implement and maintain a comprehensive information and communication technologies (ICT) risk management framework and actively participate in risk assessments and mitigation strategies
- Promptly identify, report and respond to ICT-related incidents
- Participate in regular resilience testing to help assess and improve our defences against cyber threats
- Conduct due diligence on ICT third-party providers, confirm they meet DORA's standards and monitor their performance
- Follow cybersecurity best practices, report suspicious activity and comply with all protocols to protect our ICT systems
What can you expect your employees to learn?
Introduction
What is DORA?
- Who does it apply to?
- The five pillars
Pillar 1: ICT risk management and governance
- ICT risk management and governance
- What this means for our firm
- What this means for you
- You decide
Pillar 2: Incident reporting
- What this means for our firm
- What this means for you
- You decide
Pillar 3: Resilience testing
- What this means for our firm
- What this means for you
- You decide
Pillar 4: ICT third-party risk management
- What this means for our firm
- What this means for you
- You decide
Pillar 5: Information sharing
- What this means for our firm
- What this means for you
- You decide
Summary
Affirmation
Assessment
Does your company have…
Under 50 employees?
We recommend our CoreCompliance, our solution, perfect for smaller teams. Start your training immediately with pre-configured, ready-to-go courses.
Over 50 employees?
We have a range of flexible pricing plans to suit your unique needs. Choose from off-the-shelf course libraries or a customised, bespoke approach to reach your compliance learning goals.
Stay up to date on the latest compliance news
Your questions, answered
CoreCompliance
DORA
Cybersecurity
Common FAQs
Where can I track incidents involving personal data?
How can I benchmark my team's cybersecurity awareness?
An anonymous cybersecurity awareness survey can assess your team's understanding of critical security practices. Skillcast offers ready-to-use surveys to benchmark awareness levels and identify areas needing extra focus.
How can I benchmark my team's cyber security awareness?
Which courses are included in CoreCompliance?
All users get access to courses on popular compliance topics, such as: bribery, cybersecurity, equality, health and safety. In addition, you can get courses specific to your business sector.
There are over 150 courses included within the CoreCompliance package. The actual courses provided depend on the sector chosen for the subscription.
Are CoreCompliance courses only intended for use by those based in the UK?
Do the courses bookmark my progress?
What are in-depth courses?
What are microlearning courses?
Can we use a Skillcast certificate to evidence training to regulators, courts, etc?
What is "mandatory training"?
How do I check my mandatory training?
What is in my training record?
Can I get certificates for courses I've completed?
How do I update my details?
Do I get a dashboard to manage my employees?
How do I start a subscription?
Can I change the number of seats in my subscription?
Can I get monthly or annual subscriptions?
Can I get an invoice for the subscription?
How long do I have to wait to assign training after making the payment?
How do I purchase more seats?
Can I reuse the seats of employees who have left my company?
Can I add more than 50 users to my subscription?
Can I get a refund if I terminate my subscription partway through the year?
Are the courses SCORM-compliant?
What other tools are needed beyond training?
Can users only view the courses assigned to them?
Related courses
Boost your compliance efforts with our range of courses. Varying in length and topic, our courses equip you with the tools to create an ethical and resilient workplace.
Phishing
It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.
Information Security
The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.
Understanding Modern Slavery
Bring "Understanding Modern Slavery" training to life using animation characters and storylines.
Gifts and Hospitality
Bring "Gifts and Hospitality" compliance training to life using animation characters and storylines.
Spot a Phishing Attempt
Bring "Spot a Phishing Attempt" online training to life using animation characters and storylines.
Abuse of Position
Bring "Abuse of Position" training to life using animation characters and storylines.
Whistleblowing
Bring "Whistleblowing" online training to life using animation characters and storylines.
Money Laundering Red Flags
Bring "Money Laundering Red Flags" training to life using animation characters and storylines.
Speak Up
Bring "Speak Up" compliance training to life using animation characters and storylines.
Display Screen Equipment
Bring "Display Screen Equipment" e-learning to life using animation characters and storylines.
Identity Fraud
Bring "Identity Fraud" compliance training to life using animation characters and storylines.
Slips and Trips
Bring "Slips and Trips" online training to life using animation characters and storylines.
Manual Handling
Bring "Manual Handling" e-learning to life using animation characters and storylines.
Records Management
Records management refers to employees' creation, storage, archiving, and disposal of business records.
Deepfake Awareness
Bring "Deepfake Awareness" compliance training to life using animation characters and storylines.
Understanding Information Security
Bring "Understanding Information Security" e-learning to life using animation characters and storylines.
Common Cyber Threats
Bring "Common Cyber Threats" online training to life using animation characters and storylines.
Understanding the GDPR
Bring "Understanding the GDPR" online learning to life using animation characters and storylines.
Personal Data Breaches
Bring "Personal Data Breaches" online training to life using animation characters and storylines.
Bring Your Own Device Security
Bring "Bring Your Own Device Security" training to life using animation characters and storylines.
Device Hygiene
Bring "Device Hygiene" training to life using animation characters and storylines.
Malware
Bring "Malware" training to life using animation characters and storylines.
Ransomware
Bring "Ransomware" training to life using animation characters and storylines.
Smishing
Bring "Smishing" training to life using animation characters and storylines.
Spear Phishing
Bring "Spear Phishing" training to life using animation characters and storylines.
Video Conferencing
Bring "Video Conferencing" training to life using animation characters and storylines.
Vishing
Bring "Vishing" training to life using animation characters and storylines.
Creating Strong Passwords
Bring "Creating Strong Passwords" training to life using animation characters and storylines.
Multi-factor Authentication
Bring "Multi-factor Authentication" training to life using animation characters and storylines.
Reacting to Password Breaches
Bring "Reacting to Password Breaches" training to life using animation characters and storylines.
Information Classification
Bring "Information Classification" training to life using animation characters and storylines.
Information Security on the Move
Bring "Information Security on the Move" training to life using animation characters and storylines.
Tailgating and Piggybacking
Bring "Tailgating and Piggybacking" training to life using animation characters and storylines.
Secure Web Browsing
Bring "Secure Web Browsing" training to life using animation characters and storylines.
Supply Chain Cybersecurity
Bring "Supply chain cybersecurity" training to life using animation characters and storylines.
Transferring Information Securely
Bring "Transferring Information Securely" training to life using animation characters and storylines.
Using Wi-Fi safely
Bring "Using Wi-Fi safely" training to life using animation characters and storylines.
Advising customers on cybersecurity
Bring "Advising customers on cybersecurity" training to life using animation characters and storylines.
CEO fraud
Bring "CEO fraud" training to life using animation characters and storylines.
Guide to Secure Remote Working
Bring "Guide to Secure Remote Working" training to life using animation characters and storylines.
Think Before You Click
Bring "Think before you click" training to life using animation characters and storylines.
Risks in the Use of AI
Bring "Risks in the Use of AI" training to life using animation characters and storylines.