CompTIA Cybersecurity Analyst+: Threat Management Documentation

Cyber Security    |    Intermediate
  • 10 Videos | 47m 26s
  • Includes Assessment
  • Earns a Badge
Likes 29 Likes 29
Well documented  plans and procedures are vital to business continuity if a risk threatens operation or possible litigation. Explore threat management documentation procedures, such as incident response plans, chain of custody, and SLAs.

WHAT YOU WILL LEARN

  • identify how OEM documentation can be used to reverse engineer products
    recognize the relevance of up-to-date network documentation
    recognize the ongoing maintenance of incident response plans
    create proper incident forms
    protect the integrity of collected evidence
  • implement changes to processes resulting from lessons learned
    determine which type of report provides the best data for a specific situation
    determine if SLA details are aligned with business needs
    explain the purpose of a MOU
    use existing inventory to drive decisions related to security

IN THIS COURSE

  • Playable
    1. 
    OEM Documentation
    3m 11s
    UP NEXT
  • Playable
    2. 
    Network Documentation
    4m 43s
  • Locked
    3. 
    Incident Response Plan/Call List
    4m 24s
  • Locked
    4. 
    Incident Documentation
    4m 9s
  • Locked
    5. 
    Chain of Custody Form
    4m 41s
  • Locked
    6. 
    Change Control Processes
    4m 14s
  • Locked
    7. 
    Types of Reports
    6m 38s
  • Locked
    8. 
    Service Level Agreement
    3m 36s
  • Locked
    9. 
    Memorandum of Understanding
    2m 8s
  • Locked
    10. 
    Asset Inventory
    4m 42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE