Use code COURSEFARM to get 30% OFF on all products!
Cyber Security Incident Handling and Response – Mohammad Adly
Original price was: $30.00.$10.00Current price is: $10.00.
This course covers the six phases of incident handling and responding as follows:
0- Introduction: Includes the definition of an event, incident, as well as the difference between them
1- Preparation Phase: Shows the elements of preparation and the team building,
2- Identification Phase: Demonstrates where identification occurs and the assessment for identification
3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken
- Description
- Reviews (0)
Description
Cyber Security Incident Handling and Response – Mohammad Adly
Become a professional cyber security incident handling team member or team leader
This course covers the six phases of incident handling and responding as follows:
0- Introduction: Includes the definition of an event, incident, as well as the difference between them
1- Preparation Phase: Shows the elements of preparation and the team building,
2- Identification Phase: Demonstrates where identification occurs and the assessment for identification
3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken
4- Eradication: Stresses on restoring systems and improving defenses
5- Recovery: Elaborates the validation and monitoring required for attacked systems
6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others
Who is the target audience?
- Cyber security beginners and professionals, software developers, and IT managers
Lifetime support – Download unlimited when you buy Cyber Security Incident Handling and Response – Mohammad Adly Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Intoduction
- 1. Introduction (6:56)
Preparation
- 2. Preparation of People and Policy (7:33)
- 3. Team building and Managing (6:27)
Identification
- 4. Where Does Identification Occur (6:28)
- 5. What to Check (7:05)
Containment
- 6. Deployment and Categorization (4:47)
- 7. Short-term and Long-term Actions (5:26)
Eradication
- 8. Restore and Improving Defenses (4:50)
Recovery
- 9. Validation and Monitoring (5:43)
Lessons Learned
- 10. Meet, Fix, and Share (5:29)
Reviews
There are no reviews yet.