Incident Response, Backup and Recovery Strategies, and Documentation
Cybersecurity
| Beginner
- 41 videos | 1h 34m 6s
- Includes Assessment
- Earns a Badge
It is imperative that organizations outline instructions to help IT staff identify, respond, and recover from network security incidents. By doing so, organizations can quickly recover from cybercrime events potentially resulting in data loss and service outages. In this course, you'll explore common disaster types, including natural disasters and malicious human actions that threaten organizations. Discover business continuity and disaster recovery planning goals, resources, and concepts. Discover how operational recovery planning can help ensure businesses resume day to day operations in a timely manner, as well as the importance of planning for user recovery. You'll also learn about backup technologies and strategies, and discover the importance of proper documentation. Lastly, explore how to prepare for incident responses and learn about reporting incidents and legal considerations. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe common disaster types, including natural disasters and malicious human actionsDiscuss options for handling incident investigations and recognize tools to put in placeDescribe steps to properly prepare for incident responseDiscuss how business continuity planning (bcp) can be used to prepare for potential network problemsRecognize concepts commonly used in business continuity planningOutline business continuity planning (bcp) and disaster recovery planning (drp) requirementsProvide an overview of prevention, detective, and corrective controlsOutline the focus of a disaster recovery plan (drp)Outline who should be in charge of the bcp and drpList common goals of a disaster recovery planDescribe how sufficient time, effort, and reasoning is required for disaster recovery planningOutline common content to include in a disaster recovery planDiscuss individual roles and responsibilities within the organization and their influenceUnderstand the importance of identifying priorities during disaster recovery planningOutline how recovery strategies can help restoration and recovery effortsConsider elements of a business process recovery during disaster planningOutline items to include in facility and supply recovery planningDiscuss the importance of planning for user recoveryDescribe how operational recovery planning can help ensure businesses can resume day to day operations in a timely mannerDiscuss how backup technologies and strategies can help recover from disasters
-
List alternatives for data backups including electronic vaulting, remote journaling, and database shadowingList the advantages and disadvantages of on-site and off-site backupsDiscuss concepts relating to periodic backupsPerform a backup using the 3,2,1 backup strategyProvide an overview of redundant array of independent disks (raid)Differentiate between electronic vaulting, remote journaling, and database shadowingProvide an overview of software escrow and the areas it focuses onRecognize the benefits of having an alternate processing planOutline recovery cost and time factors when planning for recoveryRecognize which controls which could help prevent or recover from an outageDiscuss how and why primary site changes should be duplicated in an environmentRecognize the importance of documentation as it relates to security strategyList other recovery documentation to maintain including contracts, manuals, forms, and contact detailsDescribe the importance of testing disaster recovery plansDiscuss how often you should test bcp/drp plans in placeRecognize the importance of preparing for incident responses and differentiate between external and internal investigationsDiscuss legal considerations when dealing with an incident including geographical complicationsOutline essential skills and tools required for incident response situationsDiscuss decisions and factors when determining whether or not to report a cybercrime to authoritiesRecognize incidents in which cyberlaw mandates that crimes be reported, including privacy violations and loss of personally identifiable information
IN THIS COURSE
-
39s
-
56s
-
3m 40s
-
3m 37s
-
2m 24s
-
2m 18s
-
1m 46s
-
2m 20s
-
4m 40s
-
1m
-
1m 2s
-
1m 26s
-
3m 29s
-
1m 2s
-
3m 21s
-
42s
-
1m 48s
-
50s
-
1m 22s
-
1m 12s
-
31s
-
29s
-
4m 23s
-
4m 55s
-
1m 22s
-
3m 25s
-
1m 14s
-
1m 48s
-
8m 42s
-
1m 29s
-
2m 16s
-
1m 21s
-
3m 26s
-
1m 54s
-
3m 17s
-
2m 14s
-
4m 15s
-
1m
-
1m 30s
-
3m 22s
-
1m 36s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.