This course covers the six phases of incident handling and responding as follows:Introduction: Includes the definition of an event, incident, as well as the difference between them
Preparation Phase: Shows the elements of preparation and the team building
Identification Phase: Demonstrates where identification occurs and the assessment for identification
Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken
Eradication: Stresses on restoring systems and improving defenses
Recovery: Elaborates the validation and monitoring required for attacked systems
Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
The essentials of the incident response and handling process that enables IT beginners as well as security professionals to be professional incident handlers
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
Team Training
Systems
Restoration
Monitoring
Team Building
Police
Course programme
Introduction
1 lecture06:52Introduction Defining event, event of interest, and incident as well as the incident handling phases
Introduction
1 lecture06:52Introduction Defining event, event of interest, and incident as well as the incident handling phases
Introduction Defining event, event of interest, and incident as well as the incident handling phases
Introduction Defining event, event of interest, and incident as well as the incident handling phases
Introduction Defining event, event of interest, and incident as well as the incident handling phases
Introduction Defining event, event of interest, and incident as well as the incident handling phases
Defining event, event of interest, and incident as well as the incident handling phases
Defining event, event of interest, and incident as well as the incident handling phases
Preparation
2 lectures13:51Preparation of People and Policy Establishing a cyber security police and preparing an incident response teamTeam Building and Management Training the team members and assigning tasks
Preparation
2 lectures13:51Preparation of People and Policy Establishing a cyber security police and preparing an incident response teamTeam Building and Management Training the team members and assigning tasks
Preparation of People and Policy Establishing a cyber security police and preparing an incident response team
Preparation of People and Policy Establishing a cyber security police and preparing an incident response team
Preparation of People and Policy Establishing a cyber security police and preparing an incident response team
Preparation of People and Policy Establishing a cyber security police and preparing an incident response team
Establishing a cyber security police and preparing an incident response team
Establishing a cyber security police and preparing an incident response team
Team Building and Management Training the team members and assigning tasks
Team Building and Management Training the team members and assigning tasks
Team Building and Management Training the team members and assigning tasks
Team Building and Management Training the team members and assigning tasks
Training the team members and assigning tasks
Training the team members and assigning tasks
Identification
2 lectures13:25Where does Identification Occur? How to identify an incident and be specificWhat to Check? Signs of incident occurrence and where to find them
Identification
2 lectures13:25Where does Identification Occur? How to identify an incident and be specificWhat to Check? Signs of incident occurrence and where to find them
Where does Identification Occur? How to identify an incident and be specific
Where does Identification Occur? How to identify an incident and be specific
Where does Identification Occur? How to identify an incident and be specific
Where does Identification Occur? How to identify an incident and be specific
How to identify an incident and be specific
How to identify an incident and be specific
What to Check? Signs of incident occurrence and where to find them
What to Check? Signs of incident occurrence and where to find them
What to Check? Signs of incident occurrence and where to find them
What to Check? Signs of incident occurrence and where to find them
Signs of incident occurrence and where to find them
Signs of incident occurrence and where to find them
Containment
2 lectures10:03Deployment and Categorization Determination of the exact category and sensitivity of incidentShort-term and Long-term Actions Actions taken to achieve containment in short and long terms
Containment
2 lectures10:03Deployment and Categorization Determination of the exact category and sensitivity of incidentShort-term and Long-term Actions Actions taken to achieve containment in short and long terms
Deployment and Categorization Determination of the exact category and sensitivity of incident
Deployment and Categorization Determination of the exact category and sensitivity of incident
Deployment and Categorization Determination of the exact category and sensitivity of incident
Deployment and Categorization Determination of the exact category and sensitivity of incident
Determination of the exact category and sensitivity of incident
Determination of the exact category and sensitivity of incident
Short-term and Long-term Actions Actions taken to achieve containment in short and long terms
Short-term and Long-term Actions Actions taken to achieve containment in short and long terms
Short-term and Long-term Actions Actions taken to achieve containment in short and long terms
Short-term and Long-term Actions Actions taken to achieve containment in short and long terms
Actions taken to achieve containment in short and long terms
Actions taken to achieve containment in short and long terms
Eradication
1 lecture04:45Restoring and Improving Defense Restoring your clean data and enhancing your defenses
Eradication
1 lecture04:45Restoring and Improving Defense Restoring your clean data and enhancing your defenses
Restoring and Improving Defense Restoring your clean data and enhancing your defenses
Restoring and Improving Defense Restoring your clean data and enhancing your defenses
Restoring and Improving Defense Restoring your clean data and enhancing your defenses
Restoring and Improving Defense Restoring your clean data and enhancing your defenses
Restoring your clean data and enhancing your defenses
Restoring your clean data and enhancing your defenses
Recovery
1 lecture05:38Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems
Recovery
1 lecture05:38Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems
Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems
Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems
Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems
Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems
Making sure that restoration is fine and keeping an eye on systems
Making sure that restoration is fine and keeping an eye on systems
Lessons Learned
1 lecture05:25Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience
Lessons Learned
1 lecture05:25Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience
Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience
Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience
Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience
Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience
Meet to learn from the incident and the fixes, then share your experience
Meet to learn from the incident and the fixes, then share your experience
Additional information
Basic IT Knowledge
Basic Computer Knowledge
Basic Microsoft Windows Knowledge