CISM 2022: Incident Response

CISM    |    Intermediate
  • 8 videos | 41m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Incident response is initiated when a security incident is confirmed. Incident response plan participants must know their roles and plan details for effectively minimizing the impact of security incidents. In this course, you will explore the components that make up an incident response plan, including roles, escalation procedures, and communication plans. Next, focus on incident escalation where applicable, incident eradication according to planned procedures, and incident containment to prevent further incident damage. Then discover the importance of analyzing past incident responses in the spirit of constant improvement and the reduction of incident response times. Lastly, find out how incident detection and automated responses are possible in the cloud. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe common characteristics of an incident response plan, including a communication plan
    Determine when and how specific incidents, such as with cloud providers, are escalated
    Recall how security incidents can be eradicated through threat removal and restoration of services
  • Recall how security incidents can be contained to limit further damage
    Benefit from lessons learned during incident response
    Configure triggers to automate incident response
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 16s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 21s
    After completing this video, you will be able to describe common characteristics of an incident response plan, including a communication plan. FREE ACCESS
  • Locked
    3.  Incident Escalation
    5m 40s
    Upon completion of this video, you will be able to determine when and how specific incidents, such as with cloud providers, are escalated. FREE ACCESS
  • Locked
    4.  Incident Eradication
    6m 18s
    After completing this video, you will be able to recall how security incidents can be eradicated through threat removal and restoration of services. FREE ACCESS
  • Locked
    5.  Incident Containment
    6m 14s
    Upon completion of this video, you will be able to recall how security incidents can be contained to limit further damage. FREE ACCESS
  • Locked
    6.  Post-incident Lessons Learned
    5m 59s
    After completing this video, you will be able to benefit from lessons learned during incident response. FREE ACCESS
  • Locked
    7.  Automating Incident Response in the Cloud
    6m 5s
    Learn how to configure triggers to automate incident response. FREE ACCESS
  • Locked
    8.  Course Summary
    49s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 21 users Rating 4.8 of 21 users (21)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)