Course Outline
Introduction to Incident Handling and Response
- Key Information Security Concepts
- Understanding Security Threats and Attack Vectors
- Defining Security Incidents
- Incident Management Overview
- Vulnerability Management Overview
- Threat Assessment Overview
- Risk Management Fundamentals
- Incident Response Automation and Orchestration
- Best Practices for Incident Handling and Response
- Standards Overview
- Cybersecurity Frameworks Overview
- Legal Considerations in Incident Handling
- Legal Compliance in Incident Handling
Incident Handling and Response Process
- IH&R Process Overview
- Step 1: Preparation for Incident Handling and Response
- Step 2: Incident Recording and Assignment
- Step 3: Incident Triage
- Step 4: Notification
- Step 5: Containment
- Step 6: Evidence Gathering and Forensics Analysis
- Step 7: Eradication
- Step 8: Recovery
- Step 9: Post-Incident Activities
Forensic Readiness and First Response
- Introduction to Computer Forensics
- Forensic Readiness Overview
- First Response Overview
- Digital Evidence Overview
- Principles of Digital Evidence Collection
- Evidence Collection Procedures
- Evidence Security Measures
- Data Acquisition Overview
- Volatile Evidence Collection
- Static Evidence Collection
- Evidence Analysis Techniques
- Anti-Forensics Overview
Handling and Response to Malware Incidents
- Malware Incident Response Overview
- Preparation for Handling Malware Incidents
- Detecting Malware Incidents
- Containment of Malware Incidents
- Eradication of Malware Incidents
- Recovery after Malware Incidents
- Guidelines for Preventing Malware Incidents
Handling and Responding to Email Security Incidents
- Email Security Incidents Overview
- Preparation for Handling Email Security Incidents
- Detection and Containment of Email Security Incidents
- Eradication of Email Security Incidents
- Recovery after Email Security Incidents
Handling and Responding to Network Security Incidents
- Network Security Incidents Overview
- Preparation for Handling Network Security Incidents
- Detection and Validation of Network Security Incidents
- Handling Unauthorized Access Incidents
- Handling Inappropriate Usage Incidents
- Handling Denial-of-Service Incidents
- Handling Wireless Network Security Incidents
Handling and Responding to Web Application Security Incidents
- Web Application Incident Handling Overview
- Web Application Security Threats and Attacks
- Preparation to Handle Web Application Security Incidents
- Detecting and Analyzing Web Application Security Incidents
- Containment of Web Application Security Incidents
- Eradication of Web Application Security Incidents
- Recovery from Web Application Security Incidents
- Best Practices for Securing Web Applications
Handling and Responding to Cloud Security Incidents
- Cloud Computing Concepts
- Cloud Security Incident Handling Overview
- Cloud Security Threats and Attacks
- Preparation for Handling Cloud Security Incidents
- Detecting and Analyzing Cloud Security Incidents
- Containment of Cloud Security Incidents
- Eradication of Cloud Security Incidents
- Recovering from Cloud Security Incidents
- Best Practices Against Cloud-based Incidents
Handling and Responding to Insider Threats
- Insider Threats Introduction
- Preparation for Handling Insider Threats
- Detecting and Analyzing Insider Threats
- Containment of Insider Threats
- Eradication of Insider Threats
- Recovery after Insider Attacks
- Best Practices Against Insider Threats
Requirements
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us