CompTIA Cybersecurity Analyst+: Business Continuity

Cybersecurity    |    Intermediate
  • 12 videos | 1h 9m 5s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Organizations must prepare in advance for the inevitable disruption of business operations. This means proactive planning to not only prevent disruptions but also manage them to reduce their negative impact. In this course, you'll begin by exploring common characteristics of a business continuity plan (BCP) and how to conduct a business impact analysis (BIA). You will then consider disaster recovery and incident response plans and focus on incident response activities such as escalation, eradication, and containment. Next, discover the importance of lessons learned from past incidents in order to make future incident response more effective. Lastly, you will explore the cyber-attack kill chain and the diamond model of intrusion analysis. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common characteristics of a business continuity plan (bcp), business impact analysis (bia), and related insurance options
    Identify common characteristics of a disaster recovery plan (drp), including recovery time objective (rto) and recovery point objective (rpo)
    Identify common characteristics of an incident response plan (irp), including communication plans
    Determine when and how specific incidents, such as with cloud providers, are escalated
    Recognize how security incidents can be eradicated through threat removal and restoration of services
  • Identify how security incidents can be contained to limit further damage
    Recognize how you can benefit from lessons learned during incident response
    Outline how to establish a security model to detect, prevent, and lessen the impact of cybersecurity events
    Identify how the diamond model is used to analyze malicious it security events
    Apply incident response to a scenario
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 43s
    Upon completion of this video, you will be able to identify common characteristics of a business continuity plan (BCP), business impact analysis (BIA), and related insurance options. FREE ACCESS
  • Locked
    3.  Disaster Recovery Plan (DRP)
    8m 13s
    After completing this video, you will be able to identify common characteristics of a disaster recovery plan (DRP), including recovery time objective (RTO) and recovery point objective (RPO). FREE ACCESS
  • Locked
    4.  Incident Response Plan (IRP)
    8m 13s
    Upon completion of this video, you will be able to identify common characteristics of an incident response plan (IRP), including communication plans. FREE ACCESS
  • Locked
    5.  Incident Escalation
    5m 29s
    After completing this video, you will be able to determine when and how specific incidents, such as with cloud providers, are escalated. FREE ACCESS
  • Locked
    6.  Incident Eradication
    6m 8s
    Upon completion of this video, you will be able to recognize how security incidents can be eradicated through threat removal and restoration of services. FREE ACCESS
  • Locked
    7.  Incident Containment
    6m 24s
    After completing this video, you will be able to identify how security incidents can be contained to limit further damage. FREE ACCESS
  • Locked
    8.  Post-incident Lessons Learned
    6m 8s
    Upon completion of this video, you will be able to recognize how you can benefit from lessons learned during incident response. FREE ACCESS
  • Locked
    9.  The Cyber Attack Kill Chain
    7m 9s
    After completing this video, you will be able to outline how to establish a security model to detect, prevent, and lessen the impact of cybersecurity events. FREE ACCESS
  • Locked
    10.  The Diamond Model of Intrusion Analysis
    5m 6s
    Upon completion of this video, you will be able to identify how the diamond model is used to analyze malicious IT security events. FREE ACCESS
  • Locked
    11.  Stepping through an Incident Response Scenario
    6m 16s
    Learn how to apply incident response to a scenario. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 4s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 212 users Rating 4.6 of 212 users (212)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)