Cyber Security Incident Handling and Response
4.1 (529 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
16,103 students enrolled

Cyber Security Incident Handling and Response

Become a professional cyber security incident handling team member or team leader
4.1 (528 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
16,103 students enrolled
Created by Mohammad Adly
Last updated 5/2018
English
English [Auto]
Current price: $23.99 Original price: $34.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • 10 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Handle and respond to cyber security incidents in your organization
Requirements
  • Be professional in the field of the cyber security incidents handling and responding
Description

This course covers the six phases of incident handling and responding as follows:

0- Introduction: Includes the definition of an event, incident, as well as the difference between them

1- Preparation Phase: Shows the elements of preparation and the team building, 

2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification

3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken

4- Eradication: Stresses on restoring systems and improving defenses

5- Recovery: Elaborates the validation and monitoring required for attacked systems

6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

Who this course is for:
  • Cyber security beginners and professionals, software developers, and IT managers
Course content
Expand all 10 lectures 59:58
+ Identification
2 lectures 13:25
Where Does Identification Occur?
06:24
What to Check?
07:01
+ Containment
2 lectures 10:03
Deployment and Categorization
04:42
Short-term and Long-term Actions
05:21
+ Eradication
1 lecture 04:45
Restoring and Improving Defenses
04:45
+ Recovery
1 lecture 05:38
Validation and Monitoring
05:38
+ Lessons Learned
1 lecture 05:25
Meet, Fix, and Share
05:25