Get in Touch

Course Outline

Introduction to Incident Handling and Response

  • Key Information Security Concepts
  • Understanding Security Threats and Attack Vectors
  • Defining Security Incidents
  • Incident Management Overview
  • Vulnerability Management Overview
  • Threat Assessment Overview
  • Risk Management Fundamentals
  • Incident Response Automation and Orchestration
  • Best Practices for Incident Handling and Response
  • Standards Overview
  • Cybersecurity Frameworks Overview
  • Legal Considerations in Incident Handling
  • Legal Compliance in Incident Handling

Incident Handling and Response Process

  • IH&R Process Overview
  • Step 1: Preparation for Incident Handling and Response
  • Step 2: Incident Recording and Assignment
  • Step 3: Incident Triage
  • Step 4: Notification
  • Step 5: Containment
  • Step 6: Evidence Gathering and Forensics Analysis
  • Step 7: Eradication
  • Step 8: Recovery
  • Step 9: Post-Incident Activities

Forensic Readiness and First Response

  • Introduction to Computer Forensics
  • Forensic Readiness Overview
  • First Response Overview
  • Digital Evidence Overview
  • Principles of Digital Evidence Collection
  • Evidence Collection Procedures
  • Evidence Security Measures
  • Data Acquisition Overview
  • Volatile Evidence Collection
  • Static Evidence Collection
  • Evidence Analysis Techniques
  • Anti-Forensics Overview

Handling and Response to Malware Incidents

  • Malware Incident Response Overview
  • Preparation for Handling Malware Incidents
  • Detecting Malware Incidents
  • Containment of Malware Incidents
  • Eradication of Malware Incidents
  • Recovery after Malware Incidents
  • Guidelines for Preventing Malware Incidents

Handling and Responding to Email Security Incidents

  • Email Security Incidents Overview
  • Preparation for Handling Email Security Incidents
  • Detection and Containment of Email Security Incidents
  • Eradication of Email Security Incidents
  • Recovery after Email Security Incidents

Handling and Responding to Network Security Incidents

  • Network Security Incidents Overview
  • Preparation for Handling Network Security Incidents
  • Detection and Validation of Network Security Incidents
  • Handling Unauthorized Access Incidents
  • Handling Inappropriate Usage Incidents
  • Handling Denial-of-Service Incidents
  • Handling Wireless Network Security Incidents

Handling and Responding to Web Application Security Incidents

  • Web Application Incident Handling Overview
  • Web Application Security Threats and Attacks
  • Preparation to Handle Web Application Security Incidents
  • Detecting and Analyzing Web Application Security Incidents
  • Containment of Web Application Security Incidents
  • Eradication of Web Application Security Incidents
  • Recovery from Web Application Security Incidents
  • Best Practices for Securing Web Applications

Handling and Responding to Cloud Security Incidents

  • Cloud Computing Concepts
  • Cloud Security Incident Handling Overview
  • Cloud Security Threats and Attacks
  • Preparation for Handling Cloud Security Incidents
  • Detecting and Analyzing Cloud Security Incidents
  • Containment of Cloud Security Incidents
  • Eradication of Cloud Security Incidents
  • Recovering from Cloud Security Incidents
  • Best Practices Against Cloud-based Incidents

Handling and Responding to Insider Threats

  • Insider Threats Introduction
  • Preparation for Handling Insider Threats
  • Detecting and Analyzing Insider Threats
  • Containment of Insider Threats
  • Eradication of Insider Threats
  • Recovery after Insider Attacks
  • Best Practices Against Insider Threats

Requirements

a:0:{}
 21 Hours

Testimonials (2)

Related Categories