Incident Response, Backup and Recovery Strategies, and Documentation
Cybersecurity
| Beginner
- 41 Videos | 1h 34m 6s
- Includes Assessment
- Earns a Badge
It is imperative that organizations outline instructions to help IT staff identify, respond, and recover from network security incidents. By doing so, organizations can quickly recover from cybercrime events potentially resulting in data loss and service outages. In this course, you'll explore common disaster types, including natural disasters and malicious human actions that threaten organizations. Discover business continuity and disaster recovery planning goals, resources, and concepts. Discover how operational recovery planning can help ensure businesses resume day to day operations in a timely manner, as well as the importance of planning for user recovery. You'll also learn about backup technologies and strategies, and discover the importance of proper documentation. Lastly, explore how to prepare for incident responses and learn about reporting incidents and legal considerations. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe common disaster types, including natural disasters and malicious human actionsdiscuss options for handling incident investigations and recognize tools to put in placedescribe steps to properly prepare for incident responsediscuss how business continuity planning (BCP) can be used to prepare for potential network problemsrecognize concepts commonly used in business continuity planningoutline business continuity planning (BCP) and disaster recovery planning (DRP) requirementsprovide an overview of prevention, detective, and corrective controlsoutline the focus of a disaster recovery plan (DRP)outline who should be in charge of the BCP and DRPlist common goals of a disaster recovery plandescribe how sufficient time, effort, and reasoning is required for disaster recovery planningoutline common content to include in a disaster recovery plandiscuss individual roles and responsibilities within the organization and their influenceunderstand the importance of identifying priorities during disaster recovery planningoutline how recovery strategies can help restoration and recovery effortsconsider elements of a business process recovery during disaster planningoutline items to include in facility and supply recovery planningdiscuss the importance of planning for user recoverydescribe how operational recovery planning can help ensure businesses can resume day to day operations in a timely mannerdiscuss how backup technologies and strategies can help recover from disasters
-
list alternatives for data backups including electronic vaulting, remote journaling, and database shadowinglist the advantages and disadvantages of on-site and off-site backupsdiscuss concepts relating to periodic backupsperform a backup using the 3,2,1 backup strategyprovide an overview of Redundant Array of Independent Disks (RAID)differentiate between electronic vaulting, remote journaling, and database shadowingprovide an overview of software escrow and the areas it focuses onrecognize the benefits of having an alternate processing planoutline recovery cost and time factors when planning for recoveryrecognize which controls which could help prevent or recover from an outagediscuss how and why primary site changes should be duplicated in an environmentrecognize the importance of documentation as it relates to security strategylist other recovery documentation to maintain including contracts, manuals, forms, and contact detailsdescribe the importance of testing disaster recovery plansdiscuss how often you should test BCP/DRP plans in placerecognize the importance of preparing for incident responses and differentiate between external and internal investigationsdiscuss legal considerations when dealing with an incident including geographical complicationsoutline essential skills and tools required for incident response situationsdiscuss decisions and factors when determining whether or not to report a cybercrime to authoritiesrecognize incidents in which cyberlaw mandates that crimes be reported, including privacy violations and loss of personally identifiable information
IN THIS COURSE
-
1.Incident Response and Backup Recovery Strategies39sUP NEXT
-
2.Common Disaster Types56s
-
3.Incident Investigation Tips3m 40s
-
4.Incident Response3m 37s
-
5.Business Continuity Planning2m 24s
-
6.Business Continuity Planning Concepts2m 18s
-
7.BCP/DRP Design Requirements1m 46s
-
8.Security Controls2m 20s
-
9.Disaster Recovery Plan4m 40s
-
10.Planning Team Members1m
-
11.Disaster Recovery Planning Goals1m 2s
-
12.Disaster Recovery Planning Resources1m 26s
-
13.Disaster Recovery Planning Contents3m 29s
-
14.Roles and Responsibilities1m 2s
-
15.Disaster Recovery Planning Priorities3m 21s
-
16.Recovery Strategies42s
-
17.Business Process Recovery1m 48s
-
18.Facility and Supply Recovery50s
-
19.User Recovery1m 22s
-
20.Operational Recovery1m 12s
-
21.Data Recovery31s
-
22.Data Backup Alternatives29s
-
23.On-Site/off-Site Backup4m 23s
-
24.Backup Types4m 55s
-
25.3,2,1 Rule of Backup1m 22s
-
26.Redundant Array of Independent Disks3m 25s
-
27.Specialty Backup Solutions1m 14s
-
28.Software Escrow1m 48s
-
29.Alternate Processing8m 42s
-
30.Recovery Costs and Times1m 29s
-
31.High Availability or Minimizing Impact2m 16s
-
32.Primary and Alternate Sites1m 21s
-
33.Equipment Documentation3m 26s
-
34.Other Documentation1m 54s
-
35.Disaster Recovery Plan Testing3m 17s
-
36.Ongoing Testing2m 14s
-
37.Forensic Incident Response4m 15s
-
38.Incident Response Legal Considerations1m
-
39.Incident Response Skills and Tools1m 30s
-
40.Incident Response Reporting3m 22s
-
41.Legally Mandated Reporting1m 36s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.