Cyber Security Incident Response and Handling

Course

Online

£ 30 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

This course covers the six phases of incident handling and responding as follows:Introduction: Includes the definition of an event, incident, as well as the difference between them
Preparation Phase: Shows the elements of preparation and the team building
Identification Phase: Demonstrates where identification occurs and the assessment for identification
Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken
Eradication: Stresses on restoring systems and improving defenses
Recovery: Elaborates the validation and monitoring required for attacked systems
Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

The essentials of the incident response and handling process that enables IT beginners as well as security professionals to be professional incident handlers

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Team Training
  • Systems
  • Restoration
  • Monitoring
  • Team Building
  • Police

Course programme

Introduction 1 lecture 06:52 Introduction Defining event, event of interest, and incident as well as the incident handling phases Introduction 1 lecture 06:52 Introduction Defining event, event of interest, and incident as well as the incident handling phases Introduction Defining event, event of interest, and incident as well as the incident handling phases Introduction Defining event, event of interest, and incident as well as the incident handling phases Introduction Defining event, event of interest, and incident as well as the incident handling phases Introduction Defining event, event of interest, and incident as well as the incident handling phases Defining event, event of interest, and incident as well as the incident handling phases Defining event, event of interest, and incident as well as the incident handling phases Preparation 2 lectures 13:51 Preparation of People and Policy Establishing a cyber security police and preparing an incident response team Team Building and Management Training the team members and assigning tasks Preparation 2 lectures 13:51 Preparation of People and Policy Establishing a cyber security police and preparing an incident response team Team Building and Management Training the team members and assigning tasks Preparation of People and Policy Establishing a cyber security police and preparing an incident response team Preparation of People and Policy Establishing a cyber security police and preparing an incident response team Preparation of People and Policy Establishing a cyber security police and preparing an incident response team Preparation of People and Policy Establishing a cyber security police and preparing an incident response team Establishing a cyber security police and preparing an incident response team Establishing a cyber security police and preparing an incident response team Team Building and Management Training the team members and assigning tasks Team Building and Management Training the team members and assigning tasks Team Building and Management Training the team members and assigning tasks Team Building and Management Training the team members and assigning tasks Training the team members and assigning tasks Training the team members and assigning tasks Identification 2 lectures 13:25 Where does Identification Occur? How to identify an incident and be specific What to Check? Signs of incident occurrence and where to find them Identification 2 lectures 13:25 Where does Identification Occur? How to identify an incident and be specific What to Check? Signs of incident occurrence and where to find them Where does Identification Occur? How to identify an incident and be specific Where does Identification Occur? How to identify an incident and be specific Where does Identification Occur? How to identify an incident and be specific Where does Identification Occur? How to identify an incident and be specific How to identify an incident and be specific How to identify an incident and be specific What to Check? Signs of incident occurrence and where to find them What to Check? Signs of incident occurrence and where to find them What to Check? Signs of incident occurrence and where to find them What to Check? Signs of incident occurrence and where to find them Signs of incident occurrence and where to find them Signs of incident occurrence and where to find them Containment 2 lectures 10:03 Deployment and Categorization Determination of the exact category and sensitivity of incident Short-term and Long-term Actions Actions taken to achieve containment in short and long terms Containment 2 lectures 10:03 Deployment and Categorization Determination of the exact category and sensitivity of incident Short-term and Long-term Actions Actions taken to achieve containment in short and long terms Deployment and Categorization Determination of the exact category and sensitivity of incident Deployment and Categorization Determination of the exact category and sensitivity of incident Deployment and Categorization Determination of the exact category and sensitivity of incident Deployment and Categorization Determination of the exact category and sensitivity of incident Determination of the exact category and sensitivity of incident Determination of the exact category and sensitivity of incident Short-term and Long-term Actions Actions taken to achieve containment in short and long terms Short-term and Long-term Actions Actions taken to achieve containment in short and long terms Short-term and Long-term Actions Actions taken to achieve containment in short and long terms Short-term and Long-term Actions Actions taken to achieve containment in short and long terms Actions taken to achieve containment in short and long terms Actions taken to achieve containment in short and long terms Eradication 1 lecture 04:45 Restoring and Improving Defense Restoring your clean data and enhancing your defenses Eradication 1 lecture 04:45 Restoring and Improving Defense Restoring your clean data and enhancing your defenses Restoring and Improving Defense Restoring your clean data and enhancing your defenses Restoring and Improving Defense Restoring your clean data and enhancing your defenses Restoring and Improving Defense Restoring your clean data and enhancing your defenses Restoring and Improving Defense Restoring your clean data and enhancing your defenses Restoring your clean data and enhancing your defenses Restoring your clean data and enhancing your defenses Recovery 1 lecture 05:38 Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems Recovery 1 lecture 05:38 Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems Validation and Monitoring Making sure that restoration is fine and keeping an eye on systems Making sure that restoration is fine and keeping an eye on systems Making sure that restoration is fine and keeping an eye on systems Lessons Learned 1 lecture 05:25 Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience Lessons Learned 1 lecture 05:25 Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience Meet, Fix, and Share Meet to learn from the incident and the fixes, then share your experience Meet to learn from the incident and the fixes, then share your experience Meet to learn from the incident and the fixes, then share your experience

Additional information

Basic IT Knowledge Basic Computer Knowledge Basic Microsoft Windows Knowledge

Cyber Security Incident Response and Handling

£ 30 + VAT