Implementing Incident Response & Recovery

Expert
  • 10 videos | 37m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 15 users Rating 4.7 of 15 users (15)
Incident response and recovery procedures are essential to enterprise security operations. In this course, you will learn about e-discovery, data breach detection, collection, and analytics, data breach isolation, recovery, and response. Other topics include incident detection and response, disaster recovery and order of volatility, incident response support tools, and post-incident response. Finally, as a scenario exercise, you will name the three phases of e-discovery, list the eight phases of EDRM, list the seven orders of volatility, and name three components to make hashed images in a forensic investigation.

WHAT YOU WILL LEARN

  • Describe e-discovery
    Specify data breach detection, collection, and analytics
    Specify data breach isolation, recovery, and response
    Facilitate incident detection and response
    Describe incident and emergency response
  • Describe disaster recovery and order of volatility
    Define incident response support tools
    Specify incident or breach severity
    Describe post-incident response
    Describe incident response and recovery

IN THIS COURSE

  • 5m 2s
    After completing this video, you will be able to describe e-discovery. FREE ACCESS
  • 3m 4s
    Upon completion of this video, you will be able to specify data breach detection, collection, and analytics. FREE ACCESS
  • Locked
    3.  Data Breach Isolation, Recovery, and Response
    6m 30s
    After completing this video, you will be able to specify data breach isolation, recovery, and response. FREE ACCESS
  • Locked
    4.  Facilitating Incident Detection and Response
    3m 3s
    In this video, find out how to detect and respond to incidents. FREE ACCESS
  • Locked
    5.  Incident and Emergency Response
    5m 11s
    After completing this video, you will be able to describe incident and emergency response procedures. FREE ACCESS
  • Locked
    6.  Disaster Recovery and Order of Volatility
    3m 19s
    Upon completion of this video, you will be able to describe disaster recovery and the order of volatility. FREE ACCESS
  • Locked
    7.  Incident Response Support Tools
    2m 4s
    In this video, you will learn how to define incident response support tools. FREE ACCESS
  • Locked
    8.  Incident or Breach Severity
    4m 16s
    Upon completion of this video, you will be able to specify the severity of an incident or breach. FREE ACCESS
  • Locked
    9.  Post-incident Response
    2m 44s
    After completing this video, you will be able to describe post-incident response. FREE ACCESS
  • Locked
    10.  Exercise: Describe Incident Response and Recovery
    1m 59s
    Upon completion of this video, you will be able to describe incident response and recovery. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 56 users Rating 4.6 of 56 users (56)
Rating 4.6 of 185 users Rating 4.6 of 185 users (185)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 4.7 of 54 users Rating 4.7 of 54 users (54)
Rating 4.5 of 47 users Rating 4.5 of 47 users (47)