Cyber Security Incident Response
3.5 (145 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,351 students enrolled

Cyber Security Incident Response

Effectively respond to Cyber Security incidents
3.5 (145 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,351 students enrolled
Created by Dawn Kellum
Last updated 7/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 8 articles
  • 8 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Effectively respond to Cyber Security incidents as recommended by the United States Department of Defense, FBI Infragard and experienced Information Security professionals.
  • Understand the importance of an incident response plan
  • Understand the six phases of incident response
  • Know how to interact with Law Enforcement
  • Access a sample incident response plan
  • Understand the necessary steps taken after the Cyber Security incident
  • Understand the steps to Cyber Security incidents
  • Know which roles are necessary for the Incident Response team
  • Examine outcomes of Incident Response scenarios
Requirements
  • Obtain organizational data concerning prior cyber security incident statistics, if any
  • Some technical background in hardware, software, or applications will be helpful.
  • Be familiar with ITIL processes (Incident, problem and change management processes) and service desk escalations
  • Basic knowledge on IT infrastructure(servers, networks, applications etc).
Description

NEW 2019 Hacking Tools Lecture added! Prevent hacking-related incidents by finding vulnerabilities in your systems before malicious users and cyber criminals with Hacking Tools! NEW updated assignment added!!  This course will teach you how to effectively respond to Cyber Security incidents as recommended by the United States Department of Defense, FBI Infragard and experienced Information Security professionals.The curriculum includes, but is not limited to, learning the fundamentals of incident response, establishing requirements, setting up operations, communicating effectively, making operations in place work effectively, legal and law enforcement involvement, training and awareness, etc.

Learn what roles are needed to manage an incident response team. Given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense. Detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge.

Who this course is for:
  • Risk management professionals
  • Information security engineers and managers
  • IT managers
  • Operations managers
  • IT/System Administration/Network Administration Professionals
  • IT auditors
  • Business continuity and disaster recovery staff
Course content
Expand all 18 lectures 01:20:11
+ KSC- Incident Response Introduction
1 lecture 03:00

This course covers the following needed to effectively respond to cyber security incidents within your company:  



Incident Response – Module 1

  • Introduction
  • PURPOSE
  • The importance of an incident response plan (Benefits of a Structured Incident Response Methodology)
  • The importance of an incident response plan - Scenario
  • The Problem
  • Incident Response Plan Effectiveness
  • Effective Incident Response plans save money

Incident Response – Module 2

  • Every System is Vulnerable
  • Pre-define plans of Action
  • Six phases of incident response
  • Six phases of incident response – preparation
  • Six phases of incident response – detection
  • Six phases of incident response – containment
  • Six phases of incident response – eradication
  • Six phases of incident response –recovery
  • Six phases of incident response – follow-up
  • Creating the Incident Response plan
  • Involve law enforcement
  • Implement the Incident Response Plan

Incident Response – Module 3

  • During the breach
  • Perform an assessment
  • Keep ALL evidence
  • Contact law enforcement
  • Cyber Incident Reporting Specifics

Incident Response – Module 4

  • Prevent pitfalls
  • After the breach
  • Keep Fighting
  • Consistent Monitoring
  • Improve your Incident Response plan

Incident Response – Module 5

  • Test and Improve the plan
  • Recovery and Evaluation
  • Evaluate communications
  • Understand the Impact
  • Risk Management
  • Prepare for the worst through prevention and detection.
  • Automate incident response management –, and see how much time it can save you.
  • Cyber-Incident Response Guide – complete

Incident Response – Module 6

  • Establishing a Response Team
  • Incident Response Team Roles
  • Information Security
  • Information Technology
  • Audit
  • Legal
  • Public Relations
  • Protection
  • Human Resources
  • Incident Response Team staff
  • Responsible Elected Official (or designee for government ONLY)
  • Incident Response Manager (IRM)
  • Technical Support Staff:
  • Legal Contact:
  • Training and Exercise

Incident Response – Module 7

  • Incident Handling
  • Incident Handling – Identify
  • Incident Handling – Assess
  • Incident Handling – Respond
  • Incident Handling – Report
  • Incident Handling – Review
  • TRAINING
Preview 03:00
+ KSC - Incident Response (IR) Module 2
2 lectures 13:52
Learning Objectives - Creating the Incident Response Plan
00:13
Creating the Incident Response Plan
13:39
+ KSC - Incident Response (IR) Module 3
2 lectures 09:00
Learning Objectives - Required Actions During the Breach
00:04
Required Actions During the Breach
08:56
+ KSC - Incident Response (IR) Module 4
2 lectures 08:05
Learning Objectives - Required Actions After the Breach
00:03
Required Actions After the Breach
08:02
+ KSC - Incident Response (IR) Module 5
2 lectures 08:16
Learning Objectives - Managing Future Incidents
00:21
Managing Future Incidents
07:55
+ KSC - Incident Response (IR) Module 6
2 lectures 07:57
Learning Objectives - Incident Response Team Roles
00:08
Incident Response Team Roles
07:49
+ KSC - Incident Response (IR) Module 7
2 lectures 12:42
Learning Objectives - Elements for Successful Incident Handling
00:03
Elements for Successful Incident Handling
12:39
+ KSC - Hacking TOOLS, Additional Links, Sample Scenarios, Disclaimer
2 lectures 04:50
Additional Links and Disclaimer
00:12
This assignment includes sample scenarios an Incident Response Team may consider in order to determine incident response plan effectiveness.
BONUS: SANS Data Breach Summit Table Top Exercise Scenarios
7 questions

Find vulnerabilities in your systems before malicious users and cyber criminals with Hacking Tools!

Hacking Tools!!
04:38