Skip to content

DORA training package - Online courses on Digital Operational Resilience Act UK

The Digital Operational Resilience Act (DORA) is an EU regulation requiring the financial sector to adopt a rigorous risk management framework, ensuring resilience across IT, data, and digital operations. In full effect since 17th January 2025, DORA mandates that financial entities and their third-party technology providers align with specific technical standards for robust operational security.

Our DORA training package gives users access to almost 40 courses on cybersecurity and risk management from our off-the-shelf course libraries. These are designed to guide staff through compliance essentials, covering reporting, resilience testing, third-party risk management, and effective information sharing, to maintain regulatory standards and strengthen cybersecurity practices.

office-worker-through-window

About Our DORA Training Package 

Our training package gives users access to almost 40 courses on cybersecurity and risk management from our off-the-shelf course libraries. 

Comprehensive Training 

  • From electronic communications and malware to risks in the use of AI, our complete training package provides your staff with the knowledge and tools to protect your organisation. The interactive courses cover topics such as operational risk, security awareness, and device, network, and information security.
  • The training is customisable to your needs. You can tailor courses based on your company's specific policies, risk areas, or compliance requirements. 
 

Engaging Content for All Levels

  • You can select preferred delivery formats, from micro-learning training to in-depth, express and refresher courses—each concluding with a certificate of completion.
  • Our training uses interactive modules and real-world scenarios which have been proven to boost retention and enhance practical knowledge application.
Before working with Skillcast, we were impressed by the promises of quality service. But only once we started working with the Skillcast team did we realise how much that could mean. The team is exceptionally responsive, capable and committed to excellence. They will try new things, and the extremely customisable system means they’re often delivering things way beyond what we originally expected or had set out to achieve. Skillcast has been the ideal partner for our PRIDE journey

Talent Development Business Partner
Kentro

Learn more

DORA training overview

Assessments

  • All courses include assessments to measure knowledge retention and effectiveness.

Reporting

  • Comprehensive reporting tools provide detailed diagnostics, highlighting problem areas and specific risks within your organisation.

Track progress

  • Monitor your employees' progress through real-time dashboards that track course completion and assessment results.

Feedback

  • Customised feedback reports identify knowledge gaps, enabling you to focus future training efforts where they're needed most.

About our learning styles

In-depth

These are our more detailed e-learning courses that include practice scenarios and typically last between 25 and 45 minutes.

Refresher

These targeted courses help reinforce your employees' knowledge and notify them of any updates they might not be aware of.

Express

Our focused training courses deliver employee learning in smaller chunks, typically lasting between 10 and 15 minutes.

Microlearning

These bite-sized animated training videos can be delivered as: standalone, embedded in detailed e-learning courses, or compiled into a learning path.

Keep your compliance under control with our DORA-aligned courses

Information Security Compliance Training Course

In-depth 35 Minutes DORA All staff

The security of client and internal information is critical for businesses.

Cybersecurity Awareness Training Course

Express 20 Minutes Cybersecurity DORA All staff

Most businesses conduct some or all of their operations using digital media.

Phishing

Express 15 Minutes Cybersecurity DORA All staff

It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.

DORA Compliance Online Training Course

In-depth 25 Minutes DORA All staff

The Digital Operational Resilience Act (DORA) is a regulatory framework set by the European Union to enhance the cybersecurity and operational resilience of financial institutions.

Experience compliance made simple with a Skillcast demo

Book your demo

Information Security

Refresher 20 Minutes Cybersecurity DORA All staff

The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.

Electronic Communications

In-depth 25 Minutes DORA All staff

Emails and instant messages can quickly make headlines, damage reputations and lead to lawsuits.

Operational Resilience

In-depth 55 Minutes DORA All staff

The FCA has made operational resilience a requirement for banks, building societies, PRA-designated investment firms, enhanced scope firms and other financial institutions.

Spot a Phishing Attempt

Microlearning 5 Minutes Cybersecurity DORA All staff

Phishing emails are fraudulent attempts by cybercriminals to trick individuals into revealing sensitive information.

Business Email Compromise

Microlearning 5 Minutes Cybersecurity DORA All staff

Business Email Compromise (BEC) is a targeted cyberattack where criminals impersonate executives or hack accounts to steal money or sensitive information.

Business Continuity Management

In-depth 40 Minutes DORA All staff

Despite the best risk management efforts, some events will be beyond your control, and your Company needs to plan for them accordingly.

Operational Risk

In-depth 50 Minutes DORA All staff

Our Operational Risk Course will help your employees understand companies' common operational risks, including legal and compliance risk, third-party risk and cyber risk.

Records Management

Express 20 Minutes DORA All staff

Records management refers to employees' creation, storage, archiving, and disposal of business records.

Deepfake Awareness

Microlearning 5 Minutes Cybersecurity DORA All staff

Deepfakes use artificial intelligence to create fake images, audio or videos that can deceive individuals and organisations.

Understanding Information Security

Microlearning 5 Minutes Cybersecurity DORA All staff

Information security is essential to protect sensitive business and customer data from unauthorised access, breaches and cyber threats.

Common Cyber Threats

Microlearning 5 Minutes Cybersecurity DORA All staff

Cyber threats such as phishing, malware, ransomware and unsecured networks pose significant risks to businesses.

Zero Trust Cybersecurity

Microlearning 5 Minutes Cybersecurity DORA All staff

The zero trust cybersecurity model ensures IT systems remain inaccessible by default, requiring strict verification before granting access.

Bring Your Own Device Security

Microlearning 5 Minutes DORA Cybersecurity All staff

Bring Your Own Device (BYOD) policies offer convenience and flexibility but also introduce cybersecurity risks.

Device Hygiene

Microlearning 5 Minutes DORA Cybersecurity All staff

Device hygiene is the practice of keeping digital devices secure and free from cyber threats to protect company data and networks.

Malware

Microlearning 5 Minutes DORA Cybersecurity All staff

Malware is malicious software designed to harm or exploit computer systems, ranging from viruses and ransomware to spyware and botnets.

Ransomware

Microlearning 5 Minutes Cybersecurity DORA All staff

Ransomware is a type of malware that encrypts files and demands payment for their release, often causing severe financial and operational damage.

Smishing

Microlearning 5 Minutes Cybersecurity DORA All staff

Smishing is a targeted phishing scam that uses deceptive text messages to gain sensitive information.

Spear Phishing

Microlearning 5 Minutes Cybersecurity DORA All staff

Spear phishing targets specific individuals with convincing emails designed to deceive them.

Video Conferencing

Microlearning 5 Minutes Cybersecurity DORA All staff

Video conferencing is a vital business tool, but it also presents security and privacy risks if not used correctly.

Vishing

Microlearning 5 Minutes Cybersecurity DORA All staff

Vishing is a social engineering attack where cybercriminals use phone calls to trick individuals into revealing sensitive information.

Creating Strong Passwords

Microlearning 5 Minutes Cybersecurity DORA All staff

Strong password protection is essential to safeguarding company systems from cyber threats such as brute force attacks and password guessing.

Multi-factor Authentication

Microlearning 5 Minutes Cybersecurity DORA All staff

Multi-factor authentication (MFA) enhances security by requiring users to verify their identity through multiple authentication methods.

Reacting to Password Breaches

Microlearning 5 Minutes Cybersecurity DORA All staff

Password breaches can lead to unauthorised access, fraud and data theft, often resulting from weak passwords, phishing or insecure networks.

Information Classification

Microlearning 5 Minutes Cybersecurity DORA All staff

This training helps employees understand different levels of information classification, their restrictions and how to handle data securely.

Information Security on the Move

Microlearning 5 Minutes Cybersecurity DORA All staff

Handling company information securely, especially when working remotely or traveling, is essential to prevent data breaches and security risks.

Tailgating and Piggybacking

Microlearning 5 Minutes Cybersecurity DORA All staff

Cybersecurity is not just about digital protection but also involves securing physical access to critical systems.

Secure Web Browsing

Microlearning 5 Minutes Cybersecurity DORA All staff

Practicing safe web browsing helps to reduce security risks and protect sensitive information.

Supply Chain Cybersecurity

Microlearning 5 Minutes Cybersecurity DORA All staff

A company’s cybersecurity is only as strong as its weakest link and supply chain vulnerabilities can expose businesses to major breaches.

Transferring Information Securely

Microlearning 5 Minutes Cybersecurity DORA All staff

Securely transferring information is essential to protect sensitive data from breaches, legal risks and business disruptions.

Using Wi-Fi safely

Microlearning 5 Minutes Cybersecurity DORA All staff

Wi-Fi connectivity offers convenience but also exposes devices and data to security risks if not properly managed.

Advising Customers on Cybersecurity

Microlearning 5 Minutes Cybersecurity DORA All staff

Cybersecurity is everyone's responsibility, including guiding customers to protect themselves from online threats.

CEO Fraud

Microlearning 5 Minutes Cybersecurity DORA All staff

CEO fraud is a type of Business Email Compromise where cybercriminals impersonate executives to trick employees into making payments or sharing confidential information.

Guide to Secure Remote Working

Microlearning 5 Minutes Cybersecurity DORA All staff

Remote work provides flexibility but also introduces cybersecurity risks that can compromise company data and systems.

Think Before You Click

Microlearning 5 Minutes Cybersecurity DORA All staff

Clicking on malicious links or attachments is one of the most common ways cybercriminals infect IT systems with malware.

Cybersecurity

In-depth 20 Minutes DORA All staff

Educate your staff on how to recognise cyber security risks, where they are likely to originate, how to combat them, and the support systems your Company has in place in the event of a cyber security incident.

Digital Operational Resilience Act (DORA)

In-depth 25 Minutes DORA All staff

Although you may feel that you treat people equally, sometimes your actions might be perceived differently by others, and lead them to feel uncomfortable or discriminated against.

people-applauding

By the end of the training, users will be able to:

  • Understand DORA’s role in managing ICT risks for the EU financial sector.
  • Identify key DORA requirements, including third-party risk, resilience testing, and reporting.
  • Recognise and respond to cybersecurity threats like phishing and ransomware.
  • Apply best practices for operational resilience, including multi-factor authentication, data security, and secure remote work.
  • Support regulatory compliance and enhance the organisation’s digital resilience.
Prior to working with Skillcast, we used inflexible systems and our CPD tracking and reporting processes were largely manual, which cost us a lot of time. We value our customers and care about empowering their professional journey. It became clear that a change was needed to honour our commitment to maintaining high standards. We not only found an FCA-focused provider that offers ongoing support in Skillcast but we have improved our processing and reporting standards. Training 360 has been a Godsend!

CE Learning Designer
Commercial Express

Learn more
Before working with Skillcast, our mandatory and refresher training was a labour intensive process focussed on administration and keeping materials up to date. Now it is a system that delivers 100% compliance with up-to-date and relevant material. It has freed us up as a business to concentrate far more on the learner experience instead of ticking boxes.

Senior Talent and Development Consultant
MS ABS

Learn more
It’s been a very positive experience for me. The videos make training easier to follow, it's much quicker to learn things, and overall it takes up less of my time. So well done on this new format, it gets a thumbs up from me!

Learner
NORD/LB

Learn more

See it in practice

Book your DORA training package demo today

With nearly 40 courses included within our Digital Operational Resiliency Training Package, your staff will use a range of course learning styles such as in-depth, refresher, and microlearning to increase knowledge retention and support your DORA compliance targets.

Your questions, answered

How can I benchmark my team's cyber security awareness?

An anonymous cybersecurity awareness survey can assess your team’s understanding of critical security practices. Skillcast offers ready-to-use surveys to benchmark awareness levels and identify areas needing extra focus.