Incident Tracking & Response

IT Security    |    Intermediate
  • 14 videos | 44m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 185 users Rating 4.6 of 185 users (185)
Explore incident tracking and response measures from the standpoint of a security architect. In 14 videos, learners will familiarize themselves with how to identify, categorize, track, and respond to incidents, as well as incident categories, integrating tracking into an organization, effective tracking, and tracking tools. Key concepts covered here include terms and definitions for communicating incident tracking; categories of incidents and how they need to be tracked; and learning who needs to have access to incident tracking information and how incident tracking can be integrated into an organization. Next, you will learn effective incident tracking practices and the tools used for incident tracking; examine approaches to setting incident response policies; and observe metrics used to measure the effectiveness of incident tracking. Learn the continuous monitoring approach to active incident tracking; learn the lifecycle of an attack and how it is tracked; and learn how to take a proactive approach to tracking incidents. Finally, learners will examine some of the cybersecurity regulations needed when it comes to tracking and responding to incidents.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the key terms and definitions for communicating incident tracking concepts
    Describe the categories of incidents and how they need to be tracked
    Describe who needs to have access to incident tracking information
    Describe how incident tracking can be integrated into an organization
    Describe effective incident tracking practices
    Describe tools used for incident tracking
  • Describe approaches to setting incident response policies
    Describe metrics used to measure the effectiveness of incident tracking
    Describe the continuous monitoring approach to active incident tracking
    Describe the life cycle of an attack and how it is tracked
    Describe how to take a proactive approach to tracking incidents
    Describe some of the cyber-security regulations when it comes to tracking and responding to incidents
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 38s
  • 4m 30s
    After completing this video, you will be able to describe the key terms and definitions for communicating incident tracking concepts. FREE ACCESS
  • Locked
    3.  Incident Tracking Categories
    4m 33s
    After completing this video, you will be able to describe the categories of incidents and how they need to be tracked. FREE ACCESS
  • Locked
    4.  Incident Tracking Access
    2m 42s
    After completing this video, you will be able to describe who needs to have access to information about incidents. FREE ACCESS
  • Locked
    5.  Incident Tracking Integration
    3m 26s
    After completing this video, you will be able to describe how incident tracking can be integrated into an organization's system. FREE ACCESS
  • Locked
    6.  Effective Incident Tracking
    3m 30s
    Upon completion of this video, you will be able to describe effective practices for tracking incidents. FREE ACCESS
  • Locked
    7.  Incident Tracking Tools
    3m 3s
    After completing this video, you will be able to describe tools used for incident response. FREE ACCESS
  • Locked
    8.  Incident Response Policy
    3m 38s
    Upon completion of this video, you will be able to describe approaches to setting policies for responding to incidents. FREE ACCESS
  • Locked
    9.  Incident Response Metrics
    3m 58s
    Upon completion of this video, you will be able to describe metrics used to measure the effectiveness of incident response. FREE ACCESS
  • Locked
    10.  Continuous Monitoring
    3m 45s
    Upon completion of this video, you will be able to describe the continuous monitoring approach to tracking active incidents. FREE ACCESS
  • Locked
    11.  Attack Life Cycle
    2m 46s
    Upon completion of this video, you will be able to describe the life cycle of an attack and how to track it. FREE ACCESS
  • Locked
    12.  Proactive Defenses
    2m 33s
    Upon completion of this video, you will be able to describe how to take a proactive approach to tracking incidents. FREE ACCESS
  • Locked
    13.  Cybersecurity Regulations
    2m 58s
    Upon completion of this video, you will be able to describe some of the cyber-security regulations related to tracking and responding to incidents. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.7 of 56 users Rating 4.7 of 56 users (56)
Rating 4.3 of 6 users Rating 4.3 of 6 users (6)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 232 users Rating 4.6 of 232 users (232)
Rating 4.4 of 178 users Rating 4.4 of 178 users (178)
Rating 4.7 of 220 users Rating 4.7 of 220 users (220)