Cyber Security Incident Handling and Incident Response | |||
Promo | 00:05:00 | ||
Section 01: An Introduction to Incident Handling | |||
1.1 Incident Handling | 00:07:00 | ||
Section 02: Preparation for an Incident | |||
2.1 Preparation of People and Policy | 00:07:00 | ||
2.2 Team Building and Management | 00:06:00 | ||
Section 03: Identification | |||
3.1 Where Does Identification Occur? | 00:06:00 | ||
3.2 What to Check? | 00:07:00 | ||
Section 04: Containment | |||
4.1 Deployment and Categorisation | 00:05:00 | ||
4.2 Short-term and Long-term Actions | 00:05:00 | ||
Section 05: Eradication | |||
5.1 Restoring and Improving Defenses | 00:05:00 | ||
Section 06: Recovery Phase | |||
6.1 Validation and Monitoring | 00:06:00 | ||
Section 07: Final Thoughts | |||
7.1 Meet, Fix, and Share | 00:05:00 | ||
Resources | |||
Resources – Cyber Security Incident Handling and Incident Response | 00:00:00 | ||
Assignment | |||
Assignment -Cyber Security Incident Handling and Incident Response | 00:00:00 |
Membership renews after 12 months. You can cancel anytime from your account.