Cyber Security Incident Response
What you'll learn
- Effectively respond to Cyber Security incidents as recommended by the United States Department of Defense, FBI Infragard and experienced Information Security professionals.
- Understand the importance of an incident response plan
- Understand the six phases of incident response
- Know how to interact with Law Enforcement
- Access a sample incident response plan
- Understand the necessary steps taken after the Cyber Security incident
- Understand the steps to Cyber Security incidents
- Know which roles are necessary for the Incident Response team
- Examine outcomes of Incident Response scenarios
Requirements
- Obtain organizational data concerning prior cyber security incident statistics, if any
- Some technical background in hardware, software, or applications will be helpful.
- Be familiar with ITIL processes (Incident, problem and change management processes) and service desk escalations
- Basic knowledge on IT infrastructure(servers, networks, applications etc).
Description
NEW 2019 Hacking Tools Lecture added! Prevent hacking-related incidents by finding vulnerabilities in your systems before malicious users and cyber criminals with Hacking Tools! NEW updated assignment added!! This course will teach you how to effectively respond to Cyber Security incidents as recommended by the United States Department of Defense, FBI Infragard and experienced Information Security professionals.The curriculum includes, but is not limited to, learning the fundamentals of incident response, establishing requirements, setting up operations, communicating effectively, making operations in place work effectively, legal and law enforcement involvement, training and awareness, etc.
Learn what roles are needed to manage an incident response team. Given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense. Detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge.
Who this course is for:
- Risk management professionals
- Information security engineers and managers
- IT managers
- Operations managers
- IT/System Administration/Network Administration Professionals
- IT auditors
- Business continuity and disaster recovery staff
Course content
- Preview03:00
Instructor
My name is Dawn Kellum. I am a Senior Critical Infrastructure Protection Cyber Security Consultant who assists companies in decreasing their risks through the effective usage of Cyber Security solutions in the areas of Assessments and Audits, Device Configuration, Security Compliance, Disaster Services and customized Cyber Security Training.
I am also a Wordpress expert and Web Designer. I have created websites valued at $3000 and more for businesses and musicians. I am also a musician who sings, plays the keyboard, organ, saxophone, bass guitar and violin (1st Chair 1st Violinist). I have worked and collaborated with musicians from all over the world, including, but not limited to, the UK, Brazil, Asia, Jamaica and more.
I was also hired in 2016 as a Cyber Security professor for a private university and National Center of Academic Excellence in Information Assurance Education (CAE/IAE) where teaching topics include, but are not limited to, Network Security, Defense Countermeasures, Disaster Recovery and more.
I have 20+ years of experience in Information Technology, Education, Business Management and Information Security supporting Government, Legal, Private, Automotive, Law Enforcement, the Energy Sector, Defense Contractors and more.
I hold a Master of Science in Information Assurance (With Distinction Graduate) from Davenport University with training endorsements in the areas of Information Systems Security (INFOSEC) Professional (NSTISSI 4011) and Senior Systems Manager (CNSSI 4012). I also hold a Bachelor of Science degree in Computer Networking Administration also from Davenport University.