Mitigating Security Risks: Managing the Incidents

IT Security    |    Intermediate
  • 13 videos | 1h 8m 14s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Security breach incidents need to be handled effectively to prevent further occurrences. An incident management process based on best practices greatly helps deal with and thoroughly learn from incidents. Use this course to recognize the steps involved in the incident management process, the dependencies this process has on other processes, and who's involved in incident management. Examine the use of incident handling forms and incident prevention measures. Furthermore, study the signs employees should look out for and escalate that indicate a security breach event is occurring. After completing this course, you'll recognize how to use the incident management process to identify, manage, and prevent security breach incidents.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define what's meant by an incident in the context of a security breach
    Outline the incident management process
    Describe the key terms used in the incident management process
    List the objectives of the incident management process and use them to recognize why this process is needed
    List the benefits of the incident management process
    List the steps involved in the incident management process
  • Describe the relationship incident management has with other processes
    List the roles and responsibilities involved in the incident management process
    Illustrate the use of incident handling forms
    Outline some incident prevention measures
    Identify the security incident signs an employee should be aware of and escalate when found
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 40s
    In this video, you’ll learn more about the course and your instructor. The course will cover the basic concept of an incident. You’ll also learn about incident management plans and the need for them within an organization. The course will cover the steps involved in the incident response. You’ll also learn about incident handling forms and the measures to prevent incidents. FREE ACCESS
  • 3m 51s
    In this video, you’ll learn more about the definition of an incident. You’ll learn an incident is a disruption of an IT service or IT function. You’ll learn problems and incidents are different. When you talk about a problem, it’s the cause or potential cause of an incident. When you talk about incidents, it’s a disruption of a service or a function that exists within the organization. FREE ACCESS
  • Locked
    3.  The Incident Management Process
    8m 18s
    In this video, you’ll learn more about the process to manage incidents. These processes can help you restore the impacted service or the function. This particular process is called the incident management process. This is part of your organization's culture. This process is designed to restore an impacted service within a defined time limit. FREE ACCESS
  • Locked
    4.  Incident Management Process Key Terms
    4m 46s
    In this video, you’ll learn more about the key terms in an incident management process. After an incident occurs, it must be logged. This includes creating and maintaining a record in the form of a ticket. Incidents are logged in form of a ticket and need to be closed. Now, because an incident is logged, there's an open ticket. Once it’s resolved, you’ll close the ticket. FREE ACCESS
  • Locked
    5.  The Need for an Incident Management Process
    6m 24s
    In this video, you’ll learn more about the objectives of an incident management process. You’ll learn there are certain objectives you need to align with this process. The first objective is to restore services and functions as soon as possible because whenever there is an incident that takes place, something is impacted. To minimize damage caused by the incident, you want to ensure the closure of the incident. FREE ACCESS
  • Locked
    6.  Incident Management Process Benefits
    8m 1s
    In this video, you’ll learn more about the incident management process benefits. The process provides you the ability to maintain service quality and reliability. Because there is a process in place, at the end you’ll have to resolve that particular incident with quality and consistency. The process ensures no incident is resolved in an ad hoc manner. Therefore, the result is always positive and it provides you with good quality. FREE ACCESS
  • Locked
    7.  Incident Management Process Steps
    2m 51s
    In this video, you’ll learn more about the steps of the incident management process steps. Different organizations will have different numbers of steps, but it doesn’t matter, because the base incident management process remains the same. The process starts with incident identification. Then, you’ll log the incident and categorize it. Then, you’ll prioritize it. Next, you’ll diagnose and investigate. FREE ACCESS
  • Locked
    8.  Incident Management: Dependencies on Other Processes
    5m 55s
    In this video, you’ll learn more about how incident management processes relate to other processes. You’ll first learn the change management process has a two-way relationship with the incident management process. An incident may require you to change something within the network or a system. Therefore, the change management process comes into the picture. FREE ACCESS
  • Locked
    9.  Incident Management Roles and Responsibilities
    6m 14s
    In this video, you’ll learn more about roles and responsibilities. First, you’ll look at the requester. This is the person who reports the incident. The next role is the tier 1 service desk. This is the primary contract for the requester. Next comes the tier 2 service desk. These are IT professionals who have in-depth knowledge of incident management. Next comes the tier 3 service desk, made up of technical specialist individuals. FREE ACCESS
  • Locked
    10.  Using Incident Management Forms
    7m 43s
    In this video, you’ll learn more about the incident report form. Different organizations may have different types of forms, but most use an application. In form, you’d need to fill out your Name, Title, the Date and Time Detected, the Location and the System and the Application is impacted. Then, you’ll need to define the type of incident. FREE ACCESS
  • Locked
    11.  Measures to Prevent Incidents
    6m 41s
    In this video, you’ll learn more about measures to prevent incidents. This includes implementing a change management process. This helps prevent any ad hoc changes. Next, you’ll implement a problem management process to track incident trends. This allows you to keep building your knowledge base, tracking how these incidents were captured and what kind of resolutions were provided. Next comes tracking recurring incidents. Then the next point of preventing the recurring incidents with proper solutions. FREE ACCESS
  • Locked
    12.  Signs of a Security Incident
    4m 20s
    In this video, you’ll learn more about the visible signs of a security incident. The first sign is the unusual outbound traffic. Somebody might be taking a lot of information from your network and sending it out. Next, look for unusual tasks performed by a privileged user account. Look for increased user deletions or lots of copying or modifications of privileges. Another sign could be suspicious registry changes. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 32s
    In this video, you’ll summarize what you’ve learned in the course. You learned the basic concepts of the incident management process. You explored about the incident, incident management process, key terms in incident management process, and the need for incident management process. You learned the benefits of incident management process, steps in incident management process, dependencies on other processes, and incident management roles and responsibilities. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 275 users Rating 4.6 of 275 users (275)
Rating 4.3 of 149 users Rating 4.3 of 149 users (149)
Rating 4.2 of 25 users Rating 4.2 of 25 users (25)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)