Incident Response, Backup and Recovery Strategies, and Documentation

Cybersecurity    |    Beginner
  • 41 videos | 1h 34m 6s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 37 users Rating 4.3 of 37 users (37)
It is imperative that organizations outline instructions to help IT staff identify, respond, and recover from network security incidents. By doing so, organizations can quickly recover from cybercrime events potentially resulting in data loss and service outages. In this course, you'll explore common disaster types, including natural disasters and malicious human actions that threaten organizations. Discover business continuity and disaster recovery planning goals, resources, and concepts. Discover how operational recovery planning can help ensure businesses resume day to day operations in a timely manner, as well as the importance of planning for user recovery. You'll also learn about backup technologies and strategies, and discover the importance of proper documentation. Lastly, explore how to prepare for incident responses and learn about reporting incidents and legal considerations. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe common disaster types, including natural disasters and malicious human actions
    Discuss options for handling incident investigations and recognize tools to put in place
    Describe steps to properly prepare for incident response
    Discuss how business continuity planning (bcp) can be used to prepare for potential network problems
    Recognize concepts commonly used in business continuity planning
    Outline business continuity planning (bcp) and disaster recovery planning (drp) requirements
    Provide an overview of prevention, detective, and corrective controls
    Outline the focus of a disaster recovery plan (drp)
    Outline who should be in charge of the bcp and drp
    List common goals of a disaster recovery plan
    Describe how sufficient time, effort, and reasoning is required for disaster recovery planning
    Outline common content to include in a disaster recovery plan
    Discuss individual roles and responsibilities within the organization and their influence
    Understand the importance of identifying priorities during disaster recovery planning
    Outline how recovery strategies can help restoration and recovery efforts
    Consider elements of a business process recovery during disaster planning
    Outline items to include in facility and supply recovery planning
    Discuss the importance of planning for user recovery
    Describe how operational recovery planning can help ensure businesses can resume day to day operations in a timely manner
    Discuss how backup technologies and strategies can help recover from disasters
  • List alternatives for data backups including electronic vaulting, remote journaling, and database shadowing
    List the advantages and disadvantages of on-site and off-site backups
    Discuss concepts relating to periodic backups
    Perform a backup using the 3,2,1 backup strategy
    Provide an overview of redundant array of independent disks (raid)
    Differentiate between electronic vaulting, remote journaling, and database shadowing
    Provide an overview of software escrow and the areas it focuses on
    Recognize the benefits of having an alternate processing plan
    Outline recovery cost and time factors when planning for recovery
    Recognize which controls which could help prevent or recover from an outage
    Discuss how and why primary site changes should be duplicated in an environment
    Recognize the importance of documentation as it relates to security strategy
    List other recovery documentation to maintain including contracts, manuals, forms, and contact details
    Describe the importance of testing disaster recovery plans
    Discuss how often you should test bcp/drp plans in place
    Recognize the importance of preparing for incident responses and differentiate between external and internal investigations
    Discuss legal considerations when dealing with an incident including geographical complications
    Outline essential skills and tools required for incident response situations
    Discuss decisions and factors when determining whether or not to report a cybercrime to authorities
    Recognize incidents in which cyberlaw mandates that crimes be reported, including privacy violations and loss of personally identifiable information

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Rating 4.5 of 28 users Rating 4.5 of 28 users (28)
Rating 4.8 of 24 users Rating 4.8 of 24 users (24)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1244 users Rating 4.6 of 1244 users (1244)
Rating 4.3 of 70 users Rating 4.3 of 70 users (70)
Rating 4.3 of 58 users Rating 4.3 of 58 users (58)