Cyber Security Incident Response
3.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cyber Security Incident Response to your Wishlist.

Add to Wishlist

Cyber Security Incident Response

Effectively respond to Cyber Security incidents
3.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42 students enrolled
Created by Dawn Kellum
Last updated 12/2016
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • 8 Articles
  • 8 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Effectively respond to Cyber Security incidents as recommended by the United States Department of Defense, FBI Infragard and experienced Information Security professionals.
  • Understand the importance of an incident response plan
  • Understand the six phases of incident response
  • Know how to interact with Law Enforcement
  • Access a sample incident response plan
  • Understand the necessary steps taken after the Cyber Security incident
  • Understand the steps to Cyber Security incidents
  • Know which roles are necessary for the Incident Response team
View Curriculum
Requirements
  • Obtain organizational data concerning prior cyber security incident statistics, if any
  • Some technical background in hardware, software, or applications will be helpful.
Description

This course will teach you how to effectively respond to Cyber Security incidents as recommended by the United States Department of Defense, FBI Infragard and experienced Information Security professionals.The curriculum includes, but is not limited to, learning the fundamentals of incident response, establishing requirements, setting up operations, communicating effectively, making operations in place work effectively, legal and law enforcement involvement, training and awareness, etc.

Learn what roles are needed to manage an incident response team. Given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense. Detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge.

Who is the target audience?
  • Risk management professionals
  • Information security engineers and managers
  • IT managers
  • Operations managers
  • IT/System Administration/Network Administration Professionals
  • IT auditors
  • Business continuity and disaster recovery staff
Students Who Viewed This Course Also Viewed
Curriculum For This Course
17 Lectures
01:15:33
+
KSC- Incident Response Introduction
1 Lecture 03:00

This course covers the following needed to effectively respond to cyber security incidents within your company:  



Incident Response – Module 1

  • Introduction
  • PURPOSE
  • The importance of an incident response plan (Benefits of a Structured Incident Response Methodology)
  • The importance of an incident response plan - Scenario
  • The Problem
  • Incident Response Plan Effectiveness
  • Effective Incident Response plans save money

Incident Response – Module 2

  • Every System is Vulnerable
  • Pre-define plans of Action
  • Six phases of incident response
  • Six phases of incident response – preparation
  • Six phases of incident response – detection
  • Six phases of incident response – containment
  • Six phases of incident response – eradication
  • Six phases of incident response –recovery
  • Six phases of incident response – follow-up
  • Creating the Incident Response plan
  • Involve law enforcement
  • Implement the Incident Response Plan

Incident Response – Module 3

  • During the breach
  • Perform an assessment
  • Keep ALL evidence
  • Contact law enforcement
  • Cyber Incident Reporting Specifics

Incident Response – Module 4

  • Prevent pitfalls
  • After the breach
  • Keep Fighting
  • Consistent Monitoring
  • Improve your Incident Response plan

Incident Response – Module 5

  • Test and Improve the plan
  • Recovery and Evaluation
  • Evaluate communications
  • Understand the Impact
  • Risk Management
  • Prepare for the worst through prevention and detection.
  • Automate incident response management –, and see how much time it can save you.
  • Cyber-Incident Response Guide – complete

Incident Response – Module 6

  • Establishing a Response Team
  • Incident Response Team Roles
  • Information Security
  • Information Technology
  • Audit
  • Legal
  • Public Relations
  • Protection
  • Human Resources
  • Incident Response Team staff
  • Responsible Elected Official (or designee for government ONLY)
  • Incident Response Manager (IRM)
  • Technical Support Staff:
  • Legal Contact:
  • Training and Exercise

Incident Response – Module 7

  • Incident Handling
  • Incident Handling – Identify
  • Incident Handling – Assess
  • Incident Handling – Respond
  • Incident Handling – Report
  • Incident Handling – Review
  • TRAINING
Preview 03:00
+
KSC - Incident Response (IR) Module 2
2 Lectures 13:54
Learning Objectives - Creating the Incident Response Plan
00:15

Creating the Incident Response Plan
13:39
+
KSC - Incident Response (IR) Module 3
2 Lectures 09:00
Learning Objectives - Required Actions During the Breach
00:04

Required Actions During the Breach
08:56
+
KSC - Incident Response (IR) Module 4
2 Lectures 08:06
Learning Objectives - Required Actions After the Breach
00:04

Required Actions After the Breach
08:02
+
KSC - Incident Response (IR) Module 5
2 Lectures 08:17
Learning Objectives - Managing Future Incidents
00:22

Managing Future Incidents
07:55
+
KSC - Incident Response (IR) Module 6
2 Lectures 07:57
Learning Objectives - Incident Response Team Roles
00:08

Incident Response Team Roles
07:49
+
KSC - Incident Response (IR) Module 7
2 Lectures 12:44
Learning Objectives - Elements for Successful Incident Handling
00:05

Elements for Successful Incident Handling
12:39
+
KSC - Incident Response (IR) Summary and Conclusion
1 Lecture 04:20
KSC - Incident Response Review
04:20
+
KSC - Additional Links and Disclaimer
1 Lecture 00:12
Additional Links and Disclaimer
00:12
About the Instructor
Dawn Kellum
3.3 Average rating
2 Reviews
42 Students
1 Course
CyberSecurity Instructor/Network Security Engineer

My name is Dawn Kellum. I am a lead instructor at KSC Learn, a subsidiary of Kellum Security Consulting, LLC, a company based out of the Midwestern United States, who assists organizations in securing their data by effectively increasing staff Cyber Security Awareness through innovative training. I hold a Master of Science in Information Assurance from Davenport University with training endorsements in the areas of an Information Systems Security (INFOSEC) Professional (NSTISSI 4011) and a Senior Systems Manager (CNSSI 4012). I hold a Bachelor of Science in Network Administration with Cisco and Microsoft specialties also from Davenport University.

I have 15+ years of experience in Information Technology, Business Management and Information Security. I have extensive knowledge in the areas of Information Security, Incident Response and more. I am also a Cyber Security professor at a local private university where teaching topics include, but are not limited to, Network Security, Defense Countermeasures, Disaster Recovery and more. 

I have multiple affiliations/memberships/partnerships with organizations, including, but not limited to, Microsoft, Symantec, CloudFlare, MS-ISAC, Infragard,ISACA, the Cyber Security Forum Initiative, Gartner, the local ISSA,ISC2, CNSS, NICE, US-CERT, MI Cyber Corps and many more.