Digital Operational Resilience Act (DORA) Training Package

The Digital Operational Resilience Act (DORA) is an EU regulation requiring the financial sector to adopt a rigorous risk management framework, ensuring resilience across IT, data, and digital operations. Set to take full effect by 17 January 2025, DORA mandates that financial entities and their third-party technology providers align with specific technical standards for robust operational security.

Our DORA training package gives users access to almost 40 courses on cybersecurity and risk management from our off-the-shelf course libraries. These are designed to guide staff through compliance essentials, covering reporting, resilience testing, third-party risk management, and effective information sharing, to maintain regulatory standards and strengthen cybersecurity practices.

Request a Free Trial

Chevron Skillcast chevron graphic
DORA 1

Featured Resources

DORA-webinar-graphic

Upcoming: DORA Webinar

Register for a comprehensive webinar on the Digital Operational Resilience Act (DORA) providing practical insights to help your organisation strengthen its digital resilience.

Register here

DORA Regulation Summary_1200x627 copy

DORA Regulation Summary

Our free guide provides an in-depth look at DORA's key elements, covering its foundational pillars, the entities it impacts, and actionable steps firms need to take to ensure compliance by the 2025 deadline. 

Download now

DORA_1200x627

Understanding the DORA regulation

The Digital Operational Resilience Act (DORA) is a new regulatory framework in the financial sector. In this blog, we explore the DORA regulation and its implications.

Learn more

About Our DORA Training Package 

Our training package gives users access to almost 40 courses on cybersecurity and risk management from our off-the-shelf course libraries. 

Comprehensive Training 

  • From electronic communications and malware to risks in the use of AI, our complete training package provides your staff with the knowledge and tools to protect your organisation. The interactive courses cover topics such as operational risk, security awareness, and device, network, and information security.
  • The training is customisable to your needs. You can tailor courses based on your company's specific policies, risk areas, or compliance requirements. 

Engaging Content for All Levels

  • You can select preferred delivery formats, from micro-learning training to in-depth, express and refresher courses—each concluding with a certificate of completion.
  • Our training uses interactive modules and real-world scenarios which have been proven to boost retention and enhance practical knowledge application.

Course outline

Microlearning courses

Can be delivered as standalone modules, embedded in standard-length e-learning courses, or compiled into learning paths. 

Advising customers on cybersecurity
Bring your own device security
Business email compromise
CEO fraud
Common cyber threats
Creating strong passwords
Deepfake awareness
Device Hygiene
Guide to Secure Remote Working
Information classification
Information security on the move
Malware
Multi-factor authentication
Ransomware
Reacting to Password Breaches
Risks in the use of AI
Secure Web Browsing
Smishing
Spear Phishing
Spot a phishing attempt
Supply chain cybersecurity
Tailgating and piggybacking
Think before you click
Transferring Information Securely
Understanding information security
Using Wi-Fi safely
Video Conferencing
Vishing
Zero trust cybersecurity model

Express courses

These deliver employee learning in bite-sized chunks, typically lasting between 10 and 15 minutes.

Phishing

Refresher courses

These courses help reinforce your employees' knowledge and notify them of any updates they might not be aware of.

Cybersecurity
Information Security

Common Questions

Are the courses SCORM-compliant?
Yes. This means they can be delivered via the Skillcast Portal or any other SCORM-compliant Learning Management System.

What other tools are needed beyond training?
A comprehensive compliance solution often needs more than just training. Alongside e-learning, tools like declarations, surveys and registers to track compliance tasks are usually essential. Skillcast provides full support to help you set up these additional tools.

How can I benchmark my team's cyber security awareness?
An anonymous cybersecurity awareness survey can assess your team’s understanding of critical security practices. Skillcast offers ready-to-use surveys to benchmark awareness levels and identify areas needing extra focus.

Training Overview

  • All courses include assessments to measure knowledge retention and effectiveness.
  • Comprehensive reporting tools provide detailed diagnostics, highlighting problem areas and specific risks within your organisation.
  • Monitor your employees' progress through real-time dashboards that track course completion and assessment results.
  • Customised feedback reports identify knowledge gaps, enabling you to focus future training efforts where they're needed most.

Contact us

Chevron Skillcast chevron graphic
SOLUTION-GIF-2

Course Specifications

Structure

Structure

39 Digital Operational Resilience Act training courses, including in-course assessments.

Audience

Audience

Suitable for all staff - examples and interactivities designed for staff at all levels. No previous knowledge or experience required.

Design

Design

SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via a client style sheet.

Fast track

FastTrack Option

Ability to offer optional test-out, whereby users can choose to skip the course content and complete the learning assignment simply by passing the assessment.

Compatibility

Compatibility

All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility). AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC.

Tailoring

Tailoring

Fully customisable on Skillcast Portal CMS.

Translation

Translation

Pre-translated versions are available, and text content can also be exported for translation into all languages.

Localisation

Localisation

Based on EU legislation, but suitable for global audiences upon the removal of specific references and translation as necessary.

By the end of the training, users will be able to:

  • Understand DORA’s role in managing ICT risks for the EU financial sector.
  • Identify key DORA requirements, including third-party risk, resilience testing, and reporting.
  • Recognise and respond to cybersecurity threats like phishing and ransomware.
  • Apply best practices for operational resilience, including multi-factor authentication, data security, and secure remote work.
  • Support regulatory compliance and enhance the organisation’s digital resilience.

Book a demo