Cybersecurity Incident Handling & Response

This course covers the six phases of incident handling and responding as follows: 0- Introduction: Includes the definition of an event, incident, as well as the difference between them 1- Prepar...
created by Mohammad Adly
Last updated 2022-04-29
Language: English
Share
$40
$60
Buy Now
30 days money back guarantee
This course has
Full Lifetime Access
Access on mobile
Certificate of Completion

Your Coverages

  • This course covers the six phases of incident handling and responding as follows: 0- Introduction: Includes the definition of an event, incident, as well as the difference between them 1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification 3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken 4- Eradication: Stresses on restoring systems and improving defenses 5- Recovery: Elaborates the validation and monitoring required for attacked systems 6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

    Course Requirements

  1. The material requires only basic IT knowledge and a little of cybersecurity background.

    Which Students must take this course

  1. The course targets cybersecurity officers and incident handlers

Course Content

Introduction
00:06:52

Preparation 1
00:07:28
Preparation 2
00:06:22

identification 1
00:06:24
Identification 2
00:07:01

Containment 1
00:04:42
Containment 2
00:05:21

Eradictaion
00:04:45

Recovery
00:05:38

Lessons Learned
00:05:25

Description

This course covers the six phases of incident handling and responding as follows: 0- Introduction: Includes the definition of an event, incident, as well as the difference between them 1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification 3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken 4- Eradication: Stresses on restoring systems and improving defenses 5- Recovery: Elaborates the validation and monitoring required for attacked systems 6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

Instructor Profile

Mohammad Adly
Mohammad Adly
Ph. D. Computer Networks & Cybersecurity
Lecturer of Computer Networks and Cybersecurity for more than 20 years
$40
$60
Buy Now
30 days money back guarantee
This course has
Full Lifetime Access
Access on mobile
Certificate of Completion
total time 01:00:01
Message 1 sec ago
URL has been copied
whatsapp