Mitigating Security Risks: Managing the Incidents
IT Security
| Intermediate
- 13 videos | 1h 8m 14s
- Includes Assessment
- Earns a Badge
Security breach incidents need to be handled effectively to prevent further occurrences. An incident management process based on best practices greatly helps deal with and thoroughly learn from incidents. Use this course to recognize the steps involved in the incident management process, the dependencies this process has on other processes, and who's involved in incident management. Examine the use of incident handling forms and incident prevention measures. Furthermore, study the signs employees should look out for and escalate that indicate a security breach event is occurring. After completing this course, you'll recognize how to use the incident management process to identify, manage, and prevent security breach incidents.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine what's meant by an incident in the context of a security breachOutline the incident management processDescribe the key terms used in the incident management processList the objectives of the incident management process and use them to recognize why this process is neededList the benefits of the incident management processList the steps involved in the incident management process
-
Describe the relationship incident management has with other processesList the roles and responsibilities involved in the incident management processIllustrate the use of incident handling formsOutline some incident prevention measuresIdentify the security incident signs an employee should be aware of and escalate when foundSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 40sIn this video, you’ll learn more about the course and your instructor. The course will cover the basic concept of an incident. You’ll also learn about incident management plans and the need for them within an organization. The course will cover the steps involved in the incident response. You’ll also learn about incident handling forms and the measures to prevent incidents. FREE ACCESS
-
3m 51sIn this video, you’ll learn more about the definition of an incident. You’ll learn an incident is a disruption of an IT service or IT function. You’ll learn problems and incidents are different. When you talk about a problem, it’s the cause or potential cause of an incident. When you talk about incidents, it’s a disruption of a service or a function that exists within the organization. FREE ACCESS
-
8m 18sIn this video, you’ll learn more about the process to manage incidents. These processes can help you restore the impacted service or the function. This particular process is called the incident management process. This is part of your organization's culture. This process is designed to restore an impacted service within a defined time limit. FREE ACCESS
-
4m 46sIn this video, you’ll learn more about the key terms in an incident management process. After an incident occurs, it must be logged. This includes creating and maintaining a record in the form of a ticket. Incidents are logged in form of a ticket and need to be closed. Now, because an incident is logged, there's an open ticket. Once it’s resolved, you’ll close the ticket. FREE ACCESS
-
6m 24sIn this video, you’ll learn more about the objectives of an incident management process. You’ll learn there are certain objectives you need to align with this process. The first objective is to restore services and functions as soon as possible because whenever there is an incident that takes place, something is impacted. To minimize damage caused by the incident, you want to ensure the closure of the incident. FREE ACCESS
-
8m 1sIn this video, you’ll learn more about the incident management process benefits. The process provides you the ability to maintain service quality and reliability. Because there is a process in place, at the end you’ll have to resolve that particular incident with quality and consistency. The process ensures no incident is resolved in an ad hoc manner. Therefore, the result is always positive and it provides you with good quality. FREE ACCESS
-
2m 51sIn this video, you’ll learn more about the steps of the incident management process steps. Different organizations will have different numbers of steps, but it doesn’t matter, because the base incident management process remains the same. The process starts with incident identification. Then, you’ll log the incident and categorize it. Then, you’ll prioritize it. Next, you’ll diagnose and investigate. FREE ACCESS
-
5m 55sIn this video, you’ll learn more about how incident management processes relate to other processes. You’ll first learn the change management process has a two-way relationship with the incident management process. An incident may require you to change something within the network or a system. Therefore, the change management process comes into the picture. FREE ACCESS
-
6m 14sIn this video, you’ll learn more about roles and responsibilities. First, you’ll look at the requester. This is the person who reports the incident. The next role is the tier 1 service desk. This is the primary contract for the requester. Next comes the tier 2 service desk. These are IT professionals who have in-depth knowledge of incident management. Next comes the tier 3 service desk, made up of technical specialist individuals. FREE ACCESS
-
7m 43sIn this video, you’ll learn more about the incident report form. Different organizations may have different types of forms, but most use an application. In form, you’d need to fill out your Name, Title, the Date and Time Detected, the Location and the System and the Application is impacted. Then, you’ll need to define the type of incident. FREE ACCESS
-
6m 41sIn this video, you’ll learn more about measures to prevent incidents. This includes implementing a change management process. This helps prevent any ad hoc changes. Next, you’ll implement a problem management process to track incident trends. This allows you to keep building your knowledge base, tracking how these incidents were captured and what kind of resolutions were provided. Next comes tracking recurring incidents. Then the next point of preventing the recurring incidents with proper solutions. FREE ACCESS
-
4m 20sIn this video, you’ll learn more about the visible signs of a security incident. The first sign is the unusual outbound traffic. Somebody might be taking a lot of information from your network and sending it out. Next, look for unusual tasks performed by a privileged user account. Look for increased user deletions or lots of copying or modifications of privileges. Another sign could be suspicious registry changes. FREE ACCESS
-
1m 32sIn this video, you’ll summarize what you’ve learned in the course. You learned the basic concepts of the incident management process. You explored about the incident, incident management process, key terms in incident management process, and the need for incident management process. You learned the benefits of incident management process, steps in incident management process, dependencies on other processes, and incident management roles and responsibilities. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.