Course: Cyber Security Incident Response and Handling

Cyber Security Incident Response and Handling

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

This course covers the six phases of incident handling and responding as follows:

  • Introduction: Includes the definition of an event, incident, as well as the difference between them
  • Preparation Phase: Shows the elements of preparation and the team building
  • Identification Phase: Demonstrates where identification occurs and the assessment for identification
  • Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken
  • Eradication: Stresses on restoring systems and improving defenses
  • Recovery: Elaborates the validation and monitoring required for attacked systems
  • Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others
Basic knowledge
  • Basic IT Knowledge
  • Basic Computer Knowledge
  • Basic Microsoft Windows Knowledge
What you will learn
  • The essentials of the incident response and handling process that enables IT beginners as well as security professionals to be professional incident handlers
Number of Lectures: 10
Total Duration: 01:00:00
  • Introduction  

    Defining event, event of interest, and incident as well as the incident handling phases

  • Preparation of People and Policy  

    Establishing a cyber security police and preparing an incident response team

  • Team Building and Management  

    Training the team members and assigning tasks

  • Where does Identification Occur?  

    How to identify an incident and be specific

  • What to Check?  

    Signs of incident occurrence and where to find them

  • Deployment and Categorization  

    Determination of the exact category and sensitivity of incident

  • Short-term and Long-term Actions  

    Actions taken to achieve containment in short and long terms

  • Restoring and Improving Defense  

    Restoring your clean data and enhancing your defenses

  • Validation and Monitoring  

    Making sure that restoration is fine and keeping an eye on systems

Lessons Learned
  • Meet, Fix, and Share  

    Meet to learn from the incident and the fixes, then share your experience

Reviews (0)