CompTIA Cybersecurity Analyst+: Threat Management Documentation
Cyber Security
| Intermediate
- 10 videos | 42m 26s
- Includes Assessment
- Earns a Badge
Well documented plans and procedures are vital to business continuity if a risk threatens operation or possible litigation. Explore threat management documentation procedures, such as incident response plans, chain of custody, and SLAs.
WHAT YOU WILL LEARN
-
Identify how oem documentation can be used to reverse engineer productsRecognize the relevance of up-to-date network documentationRecognize the ongoing maintenance of incident response plansCreate proper incident formsProtect the integrity of collected evidence
-
Implement changes to processes resulting from lessons learnedDetermine which type of report provides the best data for a specific situationDetermine if sla details are aligned with business needsExplain the purpose of a mouUse existing inventory to drive decisions related to security
IN THIS COURSE
-
3m 11sIn this video, you will learn how to use OEM documentation to reverse engineer products. FREE ACCESS
-
4m 43sAfter completing this video, you will be able to recognize the relevance of network documentation that is up-to-date. FREE ACCESS
-
4m 24sAfter completing this video, you will be able to recognize the importance of maintaining incident response plans. FREE ACCESS
-
4m 9sIn this video, learn how to create proper incident reports. FREE ACCESS
-
4m 41sDuring this video, you will learn how to protect the integrity of evidence you have collected. FREE ACCESS
-
4m 14sDuring this video, you will learn how to implement changes to processes based on lessons learned. FREE ACCESS
-
6m 38sIn this video, you will determine which type of report provides the best data for a specific situation. FREE ACCESS
-
3m 36sTo find out how to determine if SLA details are aligned with business needs, click here. FREE ACCESS
-
2m 8sAfter completing this video, you will be able to explain the purpose of a MOU. FREE ACCESS
-
4m 42sIn this video, find out how to use existing inventory to drive security-related decisions. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.