| Cyber Security Incident Handling and Incident Response | |||
| Promo | 00:05:00 | ||
| Section 01: An Introduction to Incident Handling | |||
| 1.1 Incident Handling | 00:07:00 | ||
| Section 02: Preparation for an Incident | |||
| 2.1 Preparation of People and Policy | 00:07:00 | ||
| 2.2 Team Building and Management | 00:06:00 | ||
| Section 03: Identification | |||
| 3.1 Where Does Identification Occur? | 00:06:00 | ||
| 3.2 What to Check? | 00:07:00 | ||
| Section 04: Containment | |||
| 4.1 Deployment and Categorisation | 00:05:00 | ||
| 4.2 Short-term and Long-term Actions | 00:05:00 | ||
| Section 05: Eradication | |||
| 5.1 Restoring and Improving Defenses | 00:05:00 | ||
| Section 06: Recovery Phase | |||
| 6.1 Validation and Monitoring | 00:06:00 | ||
| Section 07: Final Thoughts | |||
| 7.1 Meet, Fix, and Share | 00:05:00 | ||
| Resources | |||
| Resources – Cyber Security Incident Handling and Incident Response | 00:00:00 | ||
| Assignment | |||
| Assignment -Cyber Security Incident Handling and Incident Response | 00:00:00 | ||
No Reviews found for this course.