Planning a Security Incident Response
Offered By: Microsoft via edX
Course Description
Overview
This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.
Note: These courses will retire in June. Please enroll only if you are able to finish your coursework in time.
Syllabus
Module 1
- Introduction
- What is threat modelling?
- The need for incident response plans
- Assess vulnerabilities in your environment
- Establish routine monitoring and review of network traffic and system performance
- Log analysis
Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- Establish CSIRT team roles
- Establish governing policy
Module 3
- Initial assessment of incident
- Attack vectors
- What are false positives and false negatives?
- Determine the nature of the attack
- Identify the systems that have been compromised
- Choosing a containment strategy
Module 4
- Post-incident activity
- Protect the evidence while restoring functionality
- Recommendations and Lessons learned
- Security incident report
Taught by
Philip E. Helsel and Kimberly Rasmusson-Anderson
Tags
Related Courses
Deploying Applications with HerokuUdacity User Research and Design
University of Minnesota via Coursera Kubernetes Hands-On - Deploy Microservices to the AWS Cloud
Udemy Contact Center AI: Building a Dynamic Virtual Agent
Pluralsight Securely Handling Errors and Logging Security Events in ASP.NET and ASP.NET Core
Pluralsight