CompTIA Cybersecurity Analyst+: Threat Management Documentation

Cyber Security    |    Intermediate
  • 10 videos | 42m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Well documented plans and procedures are vital to business continuity if a risk threatens operation or possible litigation. Explore threat management documentation procedures, such as incident response plans, chain of custody, and SLAs.

WHAT YOU WILL LEARN

  • Identify how oem documentation can be used to reverse engineer products
    Recognize the relevance of up-to-date network documentation
    Recognize the ongoing maintenance of incident response plans
    Create proper incident forms
    Protect the integrity of collected evidence
  • Implement changes to processes resulting from lessons learned
    Determine which type of report provides the best data for a specific situation
    Determine if sla details are aligned with business needs
    Explain the purpose of a mou
    Use existing inventory to drive decisions related to security

IN THIS COURSE

  • 3m 11s
    In this video, you will learn how to use OEM documentation to reverse engineer products. FREE ACCESS
  • 4m 43s
    After completing this video, you will be able to recognize the relevance of network documentation that is up-to-date. FREE ACCESS
  • Locked
    3.  Incident Response Plan/Call List
    4m 24s
    After completing this video, you will be able to recognize the importance of maintaining incident response plans. FREE ACCESS
  • Locked
    4.  Incident Documentation
    4m 9s
    In this video, learn how to create proper incident reports. FREE ACCESS
  • Locked
    5.  Chain of Custody Form
    4m 41s
    During this video, you will learn how to protect the integrity of evidence you have collected. FREE ACCESS
  • Locked
    6.  Change Control Processes
    4m 14s
    During this video, you will learn how to implement changes to processes based on lessons learned. FREE ACCESS
  • Locked
    7.  Types of Reports
    6m 38s
    In this video, you will determine which type of report provides the best data for a specific situation. FREE ACCESS
  • Locked
    8.  Service Level Agreement
    3m 36s
    To find out how to determine if SLA details are aligned with business needs, click here. FREE ACCESS
  • Locked
    9.  Memorandum of Understanding
    2m 8s
    After completing this video, you will be able to explain the purpose of a MOU. FREE ACCESS
  • Locked
    10.  Asset Inventory
    4m 42s
    In this video, find out how to use existing inventory to drive security-related decisions. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 293 users Rating 4.6 of 293 users (293)
Rating 4.6 of 198 users Rating 4.6 of 198 users (198)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)