Cybersecurity Incident Handling and Response

Cybersecurity Incident Handling and Response

(0)

مختصر عن الكورس

This course covers the six phases of incident handling and responding as follows:

0- Introduction: Includes the definition of an event, incident, as well as the difference between them

1- Preparation Phase: Shows the elements of preparation and the team building, 

2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification

3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken

4- Eradication: Stresses on restoring systems and improving defenses

5- Recovery: Elaborates the validation and monitoring required for attacked systems

6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

The course targets cybersecurity officers and incident handlers, and the material requires only basic IT knowledge and a little of cybersecurity background.

It is worth noting that incident response is a structured approach to handle various types of security incidents, cyber threats, and data breaches. The incident response methodology aims to identify, contain, and minimize the cost of a cyberattack or a live incident. A well-built incident response (IR) plan can fix a potential vulnerability to prevent future attacks, but it is not the sum game. Response is a part of Incident Handling which in turn looks at the logistics, communications, synchronicity, and planning required to resolve an incident.

المعلومات

11.55 MB
12.47 MB
10.56 MB
10.55 MB
11.76 MB
8.27 MB
9.1 MB
8.2 MB
9.4 MB
8.61 MB
0
0 التقييم
جودة المحتوى (0)
مهارات المحاضر (0)
ترتيب وعرض المحتوى (0)
جودة الدعم (0)

التقييم (0)

جودة المحتوى
مهارات المحاضر
ترتيب وعرض المحتوى
جودة الدعم
العدد المسموح به:
المدة:
1:00 ساعة
طلاب:
28
مدة الوصول للمحتوى:
7 أيام
Mohammad Adly

Mohammad Adly

5.00

مشاركة

شارك الكورس مع أصدقائك

اشترك بالنقاط