YoVDO

Planning a Security Incident Response

Offered By: Microsoft via edX

Tags

Incident Response Courses Log Analysis Courses Vulnerability Assessment Courses Threat Modeling Courses

Course Description

Overview

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Note: These courses will retire in June. Please enroll only if you are able to finish your coursework in time.


Syllabus

Module 1

  • Introduction
  • What is threat modelling?
  • The need for incident response plans
  • Assess vulnerabilities in your environment
  • Establish routine monitoring and review of network traffic and system performance
  • Log analysis

Module 2

  • Incident Response Policy, Plan, and Procedure Creation
  • Creation of a CSIRT
  • Establish CSIRT team roles
  • Establish governing policy

Module 3

  • Initial assessment of incident
  • Attack vectors
  • What are false positives and false negatives?
  • Determine the nature of the attack
  • Identify the systems that have been compromised
  • Choosing a containment strategy

Module 4

  • Post-incident activity
  • Protect the evidence while restoring functionality
  • Recommendations and Lessons learned
  • Security incident report

Taught by

Philip E. Helsel and Kimberly Rasmusson-Anderson

Tags

Related Courses

CompTIA PenTest+ Certification
A Cloud Guru
AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder
Ethical Hacking
Cabrillo College via California Community Colleges System
Network Security
City College of San Francisco via California Community Colleges System
Ethical Hacking
Chaffey College via California Community Colleges System