YoVDO

Incident Response, BC, and DR Concepts

Offered By: (ISC)² via Coursera

Tags

Incident Response Courses Disaster Recovery Courses Data Protection Courses Business Continuity Courses Network Monitoring Courses

Course Description

Overview

Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any organization. After completing this course, the participant will be able to:  Explain how organizations respond to, recover from and continue to operate during unplanned disruptions. - Recall the terms and components of incident response. - Summarize the components of a business continuity plan. - Identify the components of disaster recovery. - Practice the terminology of and review incident response, business continuity and disaster recovery concepts. Agenda Course Introduction Module 1: Incident Response (IR) Module 2: Business Continuity (BC) Module 3: Disaster Recovery (DR) Module 4: Incident Response, Business Continuity, and Disaster Recovery Review This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.

Syllabus

  • Course Introduction
    • This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any organization.Here are the primary things to remember in this course: first, the Incident Response plan responds to unexpected changes in operating conditions to keep the business operating; second, the Business Continuity plan enables the business to continue operating throughout the crisis; and finally, if both the Incident Response and Business Continuity plans fail, the Disaster Recovery plan is activated to help the business to return to normal operations as quickly as possible. When it comes to a career in cybersecurity, the day-to-day focus is monitoring information systems and looking out for abnormal network activity, malicious software and threat actors. Security professionals spend their days ensuring the confidentiality, integrity and availability of systems and data, but in addition to safeguarding networks and securing the exchange of data and shared resources, it’s important to realize that cybersecurity goes beyond the technical aspects. Its scope encompasses the protection of people and their personal information. There is nothing more important than the health and safety of our users, coworkers and customers.
  • Incident Response (IR)
    • Throughout this module, we will focus on the goal and the individual components of Incident Response.
  • Business Continuity (BC)
    • Throughout this module, we will focus on the goal and the individual components of Business Continuity (BC).
  • Disaster Recovery (DR)
    • Throughout this module, we will focus on the goal and the individual components of Disaster Recovery (DR).
  • Incident Response, Business Continuity, and Disaster Recovery Review
    • This module will test your knowledge on what you have learned throughout this course.

Taught by

(ISC)² Education & Training

Tags

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX