CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response

Cyber Security    |    Intermediate
  • 18 videos | 1h 28m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 36 users Rating 4.5 of 36 users (36)
Assets must be identified before they can be protected and proactive planning ensures better incident response. Explore threat management incident planning and response concepts, from threat classification to lessons learned.

WHAT YOU WILL LEARN

  • Identify assets and related threats
    Recognize known, unknown persistent, and zero-day threats
    Identify what constitutes pii
    Explain payment card data
    Identify intellectual property
    Control how valuable data is used
    Configure group policy to prevent data leakage
    Determine the effect of negative incidents
    Identify stakeholders related to incident response
  • Recognize incident response roles
    Describe incident disclosure options
    Analyze host symptoms to determine the best response
    Analyze network symptoms to determine the best response
    Analyze application symptoms to determine the best response
    Contain negative incidents
    Thoroughly remove data
    Identify positive learned outcomes resulting from incidents
    Recognize threat impact and design an incident response plan

IN THIS COURSE

  • 4m 12s
    During this video, you will learn how to identify assets and related threats. FREE ACCESS
  • 3m 52s
    After completing this video, you will be able to recognize known, unknown, persistent, and zero-day threats. FREE ACCESS
  • Locked
    3.  Personally Identifiable Information
    3m 39s
    In this video, learn how to identify what PII is. FREE ACCESS
  • Locked
    4.  Payment Card Information
    5m 29s
    After completing this video, you will be able to explain payment card data. FREE ACCESS
  • Locked
    5.  Intellectual Property
    2m 40s
    In this video, you will learn how to identify intellectual property. FREE ACCESS
  • Locked
    6.  Data Loss Prevention
    7m 31s
    In this video, you will learn how to control how valuable data is used. FREE ACCESS
  • Locked
    7.  Prevent Data Storage on Unencrypted Media
    3m 18s
    To prevent data leakage, find out how to configure group policy. FREE ACCESS
  • Locked
    8.  Scope of Impact
    7m 51s
    In this video, you will learn how to determine the effect of negative incidents. FREE ACCESS
  • Locked
    9.  Stakeholders
    3m 34s
    In this video, find out how to identify stakeholders related to incident response. FREE ACCESS
  • Locked
    10.  Role-based Responsibilities
    5m 43s
    Upon completion of this video, you will be able to recognize incident response roles. FREE ACCESS
  • Locked
    11.  Incident Communication
    2m 22s
    Upon completion of this video, you will be able to describe the options for disclosing an incident. FREE ACCESS
  • Locked
    12.  Host Symptoms and Response Actions
    8m 48s
    In this video, find out how to analyze host symptoms to determine the best response. FREE ACCESS
  • Locked
    13.  Network Symptoms and Response Actions
    7m 52s
    Find out how to analyze network symptoms to determine the best response. FREE ACCESS
  • Locked
    14.  Application Symptoms and Response Actions
    5m 54s
    Learn how to analyze application symptoms to determine the best response. FREE ACCESS
  • Locked
    15.  Incident Containment
    4m 42s
    Learn how to prevent negative incidents. FREE ACCESS
  • Locked
    16.  Incident Eradication
    5m 45s
    In this video, find out how to remove data thoroughly. FREE ACCESS
  • Locked
    17.  Lessons Learned
    2m 30s
    In this video, you will identify positive outcomes that have been learned from incidents. FREE ACCESS
  • Locked
    18.  Exercise: Identify and Respond to Threats
    3m 12s
    After completing this video, you will be able to recognize the impact of threats and design an incident response plan. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 407 users Rating 4.6 of 407 users (407)
Rating 4.7 of 17 users Rating 4.7 of 17 users (17)
Rating 4.6 of 45 users Rating 4.6 of 45 users (45)