Incident Response - No Pain No Gain
Offered By: YouTube
Course Description
Overview
Learn about effective incident response strategies in this 44-minute conference talk from the Central Ohio InfoSec Summit 2016. Explore the balance of power in cybersecurity, understand the role of a SOC analyst, and discover the importance of continuous hunting. Delve into security basics, goals, and capabilities while examining the Pyramid of Pain concept. Gain insights into various threat indicators including hash values, IP addresses, domain names, and network artifacts. Understand tactics, techniques, and procedures (TTPs) for operationalization. Conclude with a deep dive into analysis and hunting data stack analytics to enhance your organization's incident response capabilities.
Syllabus
Intro
Balance of Power
Typical Sock Analyst
Continuous Hunting
Security Basics
Goals
Capabilities
Pyramid of Pain
Hash Values
IP Addresses
Domain Names
Network Artifacts
Tactics Techniques Procedures
Operationalization
Deep Dive Analysis
Hunting Data Stack Analytics
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity