Policy & Governance: Incident Response

SecOps    |    Intermediate
  • 14 videos | 1h 9m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 39 users Rating 4.6 of 39 users (39)
Learners can explore the creation, adoption, and use of an IRP (Incident Response Plan) in this 14-video course, which examines the purpose and objectives of an IPR, and how it incorporates the objectives of an organization. You will learn how to draft an IRP, and examine the six stages of incident response: preparation, identification, containment, eradication, recovery, and lessons learned. Next, you will examine several tools that are available for incident response strategies, including Sleuth Kit, Metasploit, Websense, and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams), team roles, their purpose, and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements, and will examine the international standard, ISO 27001. You will examine governance policy to direct and control IT security. Finally, you will learn to use governance polices to create incident response policies, and you will learn the elements and best practices for creating a plan.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe elements of an incident response policy and how it governs an incident response team
    Describe the incident phases that an incident policy must address and the six stages in an incident response policy
    Describe the tools available in incident response strategies including the three as in incident response and the ooda loop
    Describe how incident response is managed across various enterprise organizations, providing examples of cases where incident response policies are managed
    Describe how an incident response plan is created and what to include in it, including planning scenarios and recovery objectives
    Describe the concept of a computer security incident response team, what a team is compromised of, models and their purpose, and the benefits of outsourcing and having a csirt internally
  • Recognize what roles to assign to each member of an incident response team and describe how team members would be engaged in various scenarios
    Describe different incidence response scenarios and how an organization should respond with their incident response team
    Describe governance policy, roles and responsibilities, and them purpose of incident response planning
    Describe iso 27001 and other various compliance standards, as well as how they are applied in incident response
    Use governance policies to effectively create policies in incident response
    Describe best practices and scenarios for establishing an incident response governance policy for several business and information sectors
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 22s
  • 4m 31s
    Upon completion of this video, you will be able to describe elements of an incident response policy and how it governs an incident response team. FREE ACCESS
  • Locked
    3.  Incident Response Stages
    6m
    Upon completion of this video, you will be able to describe the incident phases that an incident policy must address and the six stages in an incident response policy. FREE ACCESS
  • Locked
    4.  Tools in Incident Response
    10m 52s
    Upon completion of this video, you will be able to describe the tools available in incident response strategies, including the three As in incident response and the OODA Loop. FREE ACCESS
  • Locked
    5.  Cyber Incident Response Management
    5m 48s
    Upon completion of this video, you will be able to describe how incident response is managed across various enterprise organizations, providing examples of cases where incident response policies are managed. FREE ACCESS
  • Locked
    6.  Drafting an Incident Response Plan
    5m 35s
    Upon completion of this video, you will be able to describe how to create an incident response plan and what to include in it, including planning scenarios and recovery objectives. FREE ACCESS
  • Locked
    7.  Computer Security Incident Response Team
    5m 28s
    After completing this video, you will be able to describe the concept of a Computer Security Incident Response Team, what a team is composed of, models and their purpose, and the benefits of outsourcing and having a CSIRT internally. FREE ACCESS
  • Locked
    8.  CSIRT Roles
    5m 9s
    After completing this video, you will be able to recognize what roles to assign to each member of an incident response team and describe how team members would be engaged in various scenarios. FREE ACCESS
  • Locked
    9.  Understanding Incident Response in Various Scenarios
    6m 21s
    After completing this video, you will be able to describe different incident response scenarios and how an organization should respond with their incident response team. FREE ACCESS
  • Locked
    10.  Purpose of a Governance Policy
    4m 27s
    Upon completion of this video, you will be able to describe governance policies, roles and responsibilities, and the purpose of incident response planning. FREE ACCESS
  • Locked
    11.  ISO and Other Compliance Standards
    4m 18s
    After completing this video, you will be able to describe ISO 27001 and other various compliance standards, as well as how they can be applied in incident response. FREE ACCESS
  • Locked
    12.  Governing Incident Response Policies
    3m 51s
    In this video, you will learn how to use governance policies to effectively create policies for incident response. FREE ACCESS
  • Locked
    13.  Governance Policy Best Practices
    4m 57s
    Upon completion of this video, you will be able to describe best practices and scenarios for establishing an incident response governance policy for several business and information sectors. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 15s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 1033 users Rating 4.6 of 1033 users (1033)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
Rating 4.7 of 291 users Rating 4.7 of 291 users (291)
Rating 4.5 of 3334 users Rating 4.5 of 3334 users (3334)