Certified in Cybersecurity (CC): Incident Response

Cybersecurity    |    Beginner
  • 10 videos | 28m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Practically anything that occurs in the enterprise can be called an event, but not all events are negative occurrences. It is the problematic events that are managed with the incident response practice. In this course, you will begin by exploring incident terminology and the goal of incident response. Next, discover the phases of the incident response lifecycle: Preparation, Detection and Analysis, Containment, and Post-incident Activities. Finally, you will explore additional incident response topics, including incident response teams, forensics, and problem management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define various incident terms such as breach, exploit, intrusion, and zero day
    Recognize the goal of incident response which involves having a tested plan for adverse events
    Outline the initial preparation phase of the incident response lifecycle
    Outline the detection and analysis phase of the incident response lifecycle
  • Outline the containment phase of the incident response lifecycle
    Outline post-incident activities such as after-action reporting and lessons learned
    Identify the function of incident response teams, including various sources and responsibilities of computer science incident response teams (csirt)
    Provide an overview of forensics and the problem management practice for root cause analysis
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 47s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 46s
    After completing this video, you will be able to define various incident terms such as breach, exploit, intrusion, and zero day. FREE ACCESS
  • Locked
    3.  The Goal of Incident Response
    2m 49s
    Upon completion of this video, you will be able to recognize the goal of incident response which involves having a tested plan for adverse events. FREE ACCESS
  • Locked
    4.  Phase 1: Preparation
    4m 7s
    After completing this video, you will be able to outline the initial preparation phase of the incident response lifecycle. FREE ACCESS
  • Locked
    5.  Phase 2: Detection and Analysis
    5m 38s
    Upon completion of this video, you will be able to outline the detection and analysis phase of the incident response lifecycle. FREE ACCESS
  • Locked
    6.  Phase 3: Containment
    1m 43s
    After completing this video, you will be able to outline the containment phase of the incident response lifecycle. FREE ACCESS
  • Locked
    7.  Phase 4: Post-incident Activities
    1m 43s
    Upon completion of this video, you will be able to outline post-incident activities such as after-action reporting and lessons learned. FREE ACCESS
  • Locked
    8.  Incident Response Teams
    2m 58s
    After completing this video, you will be able to identify the function of incident response teams, including various sources and responsibilities of computer science incident response teams (CSIRT). FREE ACCESS
  • Locked
    9.  Forensics and Problem Management
    4m 36s
    Upon completion of this video, you will be able to provide an overview of forensics and the problem management practice for root cause analysis. FREE ACCESS
  • Locked
    10.  Course Summary
    26s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.3 of 10 users Rating 4.3 of 10 users (10)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)