Library

Course: Build Security Incident Response for GDPR data protection

Build Security Incident Response for GDPR data protection

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

UPDATE: 8.5 hours of content - 2018!!! 

Take Security Incident Response approach in order to cover the Data Breach process required by GDPR Data Privacy Protection.

In this course you will learn what Security Incident Response is and how it relates to GDPR Data Privacy, and if you are used to my style, you will do it from 3 perspective: theory, processes and technology. 

You will be able to apply our security methodologies, security frameworks and security processes for your own environment. 

The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand Security Incident Response challenges, difference between a NOC and a SOC (Security Operation Center) and how the latest can help in defining the Security Incident Response Process. We will follow up with GDPR Data Protection & Privacy relation and the impact of GDPR to Security Incident Response for any organization. We will learn about methodologies, frameworks, playbooks, we will draft 2 procedures and we will see how technology can help us in the road map. 

And all of these are separate resources that you will get! 

In the end, I will give an incredible collection of incident response free tools and resources I have build during time and i will teach how malware works, especially in the financial market. 

The course is delivered in a mix of over the shoulder lessons and PowerPoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey. 

I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense. 

As a student of this course, you will also get regular updates and access to new additional lectures as they are added. 

Basic knowledge
  • You should have basic IT Security knowledge 
  • You should have basic audit and compliance knowledge 
  • You should have basic risk management knowledge
What you will learn
  • Understand what incident response is 
  • Will have a list of templates to use 
  • Will have a list of incident response tools and resources 
  • Will have a list of incident response playbooks
Curriculum
Number of Lectures: 83
Total Duration: 08:24:29
Introduction
  • Welcome & Intro  

    Intro about GDPR in incident response

  • Set your expectations  

    Set you expectations about what you will learn in this GDPR for incident response course

  • A 1st touch of what you will really get in the course  

    You will see what you will really get in the course

Incident Response in CyberSecurity
  • What is Incident Response and why do I need it?  

    You will understand what is incident response

  • Incident Response Team  

    You will understand incident response team components

  • Incident Response Process and Procedures  

    You will understand incident response for GDPR process

  • Types of Security Incidents  

    You will understand types of security incidents

  • Incident Response Tools - general  

    You will learn about free tools in incident response

  • What is a SIEM?  

    You will understand what is SIEM

  • Incident Response Training  

    You will understand what to focus on when training people for GDPR incident response

  • What is automation in incident response  

    You will understand what is automation in incident response

Building a Security Operations Center (SOC)
  • What is a NOC?  

    You will understand what is a NOC

  • What is a SOC?  

    You will understand what is SOC

  • Integrated NOC and SOC  

    How to integrate SOC and NOC

  • Mission, Team and Required Training  

    You will understand the team mission and required training

  • Types of SOC  

    You will understand the types of SOC

  • Building a SOC  

    You will learn how to build a SOC

  • Cheat Sheets to help you in configuring your systems  

    You will get some cheat sheets that will help you in audit configuration

GDRP and Incident Response
  • GDPR intro  

    GDPR intro

  • GDPR effects on Incident Response  

    You will understand GDPR effect on incident response

  • How to create an effective IR plan  

    You will understand how to create an incident response plan

  • GDPR Incident Response Process  

    You will understand GDPR incident response process by working ona draft document

  • Lets draft the IRM Procedure  

    You will understand GDPR incident response procedure by working on a draft document

  • How to treat data breaches  
GDPR Incident Response Methodologies (IRM)
  • IRM1 - Worm Infection  

    Get and learn incident response methodology for worm infection

  • IRM2 - Windows Intrusion  

    Get and learn incident response methodology for windows intrusion

  • IRM3 - Unix/Linux Intrusion Detection  

    Get and learn incident response methodology for unix linux intrusion

  • IRM4 - DDoS  

    Get and learn incident response methodology for ddos

  • IRM5 - Malicious Network Behaviour  

    Get and learn incident response methodology for malicious network behavior

  • IRM6 - Website Defacement  

    Get and learn incident response methodology for website defacement

  • IRM7 - Windows malware detection  

    Get and learn incident response methodology for windows malware detection

  • IRM8 - Blackmail  

    Get and learn incident response methodology for blackmail

  • IRM9 - SmartphoneMalware  

    Get and learn incident response methodology for smartphone malware

  • IRM10 - Social Engineering  

    Get and learn incident response methodology for social engineering

  • IRM11 - Information Leakage  

    Get and learn incident response methodology for information leakage

  • IRM12 - Insider Abuse  

    Get and learn incident response methodology for insider abuse

  • IRM13 - Phishing  

    Get and learn incident response methodology for phishing

  • IRM14 - Scam  

    Get and learn incident response methodology for scam

  • IRM15 - Ransomware  

    Get and learn incident response methodology for ransomware

Incident Response Tools for GDPR compliance - free vs enterprise
  • Lessons learned by working in a SOC  

    Lessons learned from SOCs

  • A list of open source tools to use  

    A list of open tools for incident response

  • Windows Defender ATP  

    Learn Windows Defender ATP

Banking challenges related to cyber risk
  • Today Challenges  

    Today Challenges

  • Target and Distribution  

    Target and Distribution

  • Attack Methods  

    Attack Methods 

  • Infection vectors  

    Infection vectors 

  • Targeted attacks against financial institutions  

    Targeted attacks against financial institutions

  • Mobile platform and email scams  

    Mobile platform and email scams

  • Takedowns and Conclusions  

    Takedowns and Conclusions 

Financial Malware history with examples
  • Past 3 decades of malware (part 1)  

    history of malware

  • Past 3 decades of malware (part 2)  

    history of malware

  • The architecture of financial malware  

    The architecture of financial malware

  • Zeus  

    Zeus malware

  • Zeus GameOver  

    ZeusGameOver malware

  • SpyEye  

    SpyEye malware

  • IceIX  

    IceIX malware

  • Citadel  

    Citadel malware

  • Carberp  

    Carberp malware

  • Shylock  

    Shylock malware

  • Bugat  

    Bugat malware

  • Dyre  

    Dyre malware

  • Dridex  

    Dridex malware

  • Shifu  

    Shifu malware

  • Tinba  

    Tinba malware

Making a business case for Financial Malware
  • Why Fraud Risk Engines fail  

    why fraud risk engines fail

  • How to bypass 2 factor authentication (2FA)  

    how to bypass 2 factor authentication

  • Fraud Prevention Technology  

    Fraud Prevention technology

  • Compliance and Legal Issues  

    Compliance and legal issues

  • Customer impact  

    Customer impact

  • Selecting the right cybercrime solution  

    Selecting the right cybercrime solution

  • Malware detection  

    Malware detection

  • Malware detection - advanced  

    Malware detection (advanced)

  • Malware detection - how technology can help  

    Malware detection - how technology can help

  • Criminal Detection & Account Takeover  

    Criminal Detection & Account Takeover

  • What about mobile banking?  

    Mobile banking attacks

Some simple hacking attempts - demo
  • Lab setup  

    What is included in the lab

  • XSRF attack  

    cross site request forgery attack

  • Compromising Public server  

    Compromising public server

  • Break-In: Compromising the victim computer  

    How to break in and compromise - hacking attempt

  • Other Web Application Attack Example  

    Other web application attacks

  • Locky Ransomware  

    Locky ransomware example

  • Gathering Info & Exfiltrate  

    How to gather info and exfiltrate

Conclusion
  • Final thoughts and other documents  

    Conclusion and one more document

Reviews (0)