CompTIA Cybersecurity Analyst+: Threat Management Documentation
Cyber Security
| Intermediate
- 10 Videos | 42m 26s
- Includes Assessment
- Earns a Badge
Well documented plans and procedures are vital to business continuity if a risk threatens operation or possible litigation. Explore threat management documentation procedures, such as incident response plans, chain of custody, and SLAs.
WHAT YOU WILL LEARN
-
identify how OEM documentation can be used to reverse engineer productsrecognize the relevance of up-to-date network documentationrecognize the ongoing maintenance of incident response planscreate proper incident formsprotect the integrity of collected evidence
-
implement changes to processes resulting from lessons learneddetermine which type of report provides the best data for a specific situationdetermine if SLA details are aligned with business needsexplain the purpose of a MOUuse existing inventory to drive decisions related to security
IN THIS COURSE
-
1.OEM Documentation3m 11sUP NEXT
-
2.Network Documentation4m 43s
-
3.Incident Response Plan/Call List4m 24s
-
4.Incident Documentation4m 9s
-
5.Chain of Custody Form4m 41s
-
6.Change Control Processes4m 14s
-
7.Types of Reports6m 38s
-
8.Service Level Agreement3m 36s
-
9.Memorandum of Understanding2m 8s
-
10.Asset Inventory4m 42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.