Planning Measures: Incident Response Planning

IT Security    |    Intermediate
  • 8 videos | 33m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
This 8-video course explores how to build an effective incident response plan, including creation of response policies, plans, procedures, and teams. In this course, you will examine the process to recover from security related incidents such as malware, data leakage, or stolen equipment. You will also review what to implement for security controls to prevent attacks against confidentiality, integrity, and availability of company assets. Learners observe how to create an incident response plan and the steps for creating incident response policies, plans, and procedures. You will learn the six phases necessary to build an incident response plan, and the job roles for each member of the team. You will examine who should be part of the CSIRT (computer security incident response team). Next, examine the different roles that make up a computer security incident response team, their purposes, and the elements of an incident response policy. Finally, this course uses a real-world case study to demonstrate how to implement the incident response plan.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify the purpose of an incident response plan and the costs of not having one in place
    List the steps to create incident response policies, plans, and procedures
    Recognize when to create a csirt and who should be on that team
  • Identify the different purposes of the different roles on a csirt
    Describe the elements of an incident response policy
    Describe how the incident response plan will be used in practice
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 30s
  • 5m 3s
    In this video, you will learn how to identify the purpose of an incident response plan and the costs of not having one in place. FREE ACCESS
  • Locked
    3.  Incident Response Creation Process
    5m 49s
    Upon completion of this video, you will be able to list the steps to create policies, plans, and procedures for incident response. FREE ACCESS
  • Locked
    4.  Computer Security Incident Response Teams
    6m
    After completing this video, you will be able to recognize when to create a CSIRT and who should be on that team. FREE ACCESS
  • Locked
    5.  CSIRT Roles
    4m 11s
    Learn how to identify the different purposes of the different roles on a CSIRT team. FREE ACCESS
  • Locked
    6.  Incident Response Governing Policy
    4m 55s
    After completing this video, you will be able to describe the elements of an incident response policy. FREE ACCESS
  • Locked
    7.  Incident Response in the Real World
    4m 46s
    Upon completion of this video, you will be able to describe how the incident response plan will work in practice. FREE ACCESS
  • Locked
    8.  Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 71 users Rating 4.4 of 71 users (71)
Rating 4.0 of 9 users Rating 4.0 of 9 users (9)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)