Implementing Incident Response & Recovery
- 10 videos | 37m 11s
- Includes Assessment
- Earns a Badge
Incident response and recovery procedures are essential to enterprise security operations. In this course, you will learn about e-discovery, data breach detection, collection, and analytics, data breach isolation, recovery, and response. Other topics include incident detection and response, disaster recovery and order of volatility, incident response support tools, and post-incident response. Finally, as a scenario exercise, you will name the three phases of e-discovery, list the eight phases of EDRM, list the seven orders of volatility, and name three components to make hashed images in a forensic investigation.
WHAT YOU WILL LEARN
describe e-discoveryspecify data breach detection, collection, and analyticsspecify data breach isolation, recovery, and responsefacilitate incident detection and responsedescribe incident and emergency response
describe disaster recovery and order of volatilitydefine incident response support toolsspecify incident or breach severitydescribe post-incident responsedescribe incident response and recovery
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE