Cyber Security Incident Handling and ResponseBecome is Archive: a professional cyber security incident handling team member or team leaderThis course covers the six phases of incident handling and responding as follows:0- Introduction: Includes the definition of an event, incident, as well as the difference between them1- Preparation Phase: Shows the elements of preparation and the team building,2- Identification Phase: Demonstrates where identification occurs and the assessment for identification3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken4- Eradication: Stresses on restoring systems and improving defenses5- Recovery: Elaborates the validation and monitoring required for attacked systems6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with othersWho is the target audience?Cyber security beginners and professionals, software developers, and IT managersCourse CurriculumIntoduction1..
Archive: Cyber Security Incident Handling and ResponseBecome a professional cyber security incident handling team member or team leaderThis course covers the six phases of incident handling and responding as follows:0- Introduction: Includes the definition of an event, incident, as well as the difference between them1- Preparation Phase: Shows the elements of preparation and the team building,2- Identification Phase: Demonstrates where identification occurs and the assessment for identification3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken4- Eradication: Stresses on restoring systems and improving defenses5- Recovery: Elaborates the validation and monitoring required for attacked systems6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with othersWho is the target audience?Cyber security beginners and professionals, software developers, and IT managersCourse CurriculumIntoduction1.
Identification is Where Does Occur (6:28)5..
Where Does Identification Occur (6:28)5.
Improving Defenses (4:50)Recovery9. is Restore and.
Restore and Improving Defenses (4:50)Recovery9.
Share (5:29) is Meet, Fix, and.
Meet, Fix, and Share (5:29)