Implementing Incident Response & Recovery
Expert
- 10 Videos | 37m 11s
- Includes Assessment
- Earns a Badge
Incident response and recovery procedures are essential to enterprise security operations. In this course, you will learn about e-discovery, data breach detection, collection, and analytics, data breach isolation, recovery, and response. Other topics include incident detection and response, disaster recovery and order of volatility, incident response support tools, and post-incident response. Finally, as a scenario exercise, you will name the three phases of e-discovery, list the eight phases of EDRM, list the seven orders of volatility, and name three components to make hashed images in a forensic investigation.
WHAT YOU WILL LEARN
-
describe e-discoveryspecify data breach detection, collection, and analyticsspecify data breach isolation, recovery, and responsefacilitate incident detection and responsedescribe incident and emergency response
-
describe disaster recovery and order of volatilitydefine incident response support toolsspecify incident or breach severitydescribe post-incident responsedescribe incident response and recovery
IN THIS COURSE
-
1.E-discovery5m 2sUP NEXT
-
2.Data Breach Detection, Collection, and Analytics3m 4s
-
3.Data Breach Isolation, Recovery, and Response6m 30s
-
4.Facilitating Incident Detection and Response3m 3s
-
5.Incident and Emergency Response5m 11s
-
6.Disaster Recovery and Order of Volatility3m 19s
-
7.Incident Response Support Tools2m 4s
-
8.Incident or Breach Severity4m 16s
-
9.Post-incident Response2m 44s
-
10.Exercise: Describe Incident Response and Recovery1m 59s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.