Policy & Governance: Incident Response

SecOps    |    Intermediate
  • 14 Videos | 1h 15m 54s
  • Includes Assessment
  • Earns a Badge
Likes 10 Likes 10
Learners can explore the creation, adoption, and use of an IRP (Incident Response Plan) in this 14-video course, which examines the purpose and objectives of an IPR, and how it incorporates the objectives of an organization. You will learn how to draft an IRP, and examine the six stages of incident response: preparation, identification, containment, eradication, recovery, and lessons learned. Next, you will examine several tools that are available for incident response strategies, including Sleuth Kit, Metasploit, Websense, and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams), team roles, their purpose, and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements, and will examine the international standard, ISO 27001. You will examine governance policy to direct and control IT security. Finally, you will learn to use governance polices to create incident response policies, and you will learn the elements and best practices for creating a plan.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe elements of an incident response policy and how it governs an incident response team
    describe the incident phases that an incident policy must address and the six stages in an incident response policy
    describe the tools available in incident response strategies including the three As in incident response and the OODA Loop
    describe how incident response is managed across various enterprise organizations, providing examples of cases where incident response policies are managed
    describe how an incident response plan is created and what to include in it, including planning scenarios and recovery objectives
    describe the concept of a Computer Security Incident Response Team, what a team is compromised of, models and their purpose, and the benefits of outsourcing and having a CSIRT internally
  • recognize what roles to assign to each member of an incident response team and describe how team members would be engaged in various scenarios
    describe different incidence response scenarios and how an organization should respond with their incident response team
    describe governance policy, roles and responsibilities, and them purpose of incident response planning
    describe ISO 27001 and other various compliance standards, as well as how they are applied in incident response
    use governance policies to effectively create policies in incident response
    describe best practices and scenarios for establishing an incident response governance policy for several business and information sectors
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 22s
    UP NEXT
  • Playable
    2. 
    Incident Response Policy Overview
    4m 31s
  • Locked
    3. 
    Incident Response Stages
    6m
  • Locked
    4. 
    Tools in Incident Response
    10m 52s
  • Locked
    5. 
    Cyber Incident Response Management
    5m 48s
  • Locked
    6. 
    Drafting an Incident Response Plan
    5m 35s
  • Locked
    7. 
    Computer Security Incident Response Team
    5m 28s
  • Locked
    8. 
    CSIRT Roles
    5m 9s
  • Locked
    9. 
    Understanding Incident Response in Various Scenarios
    6m 21s
  • Locked
    10. 
    Purpose of a Governance Policy
    4m 27s
  • Locked
    11. 
    ISO and Other Compliance Standards
    4m 18s
  • Locked
    12. 
    Governing Incident Response Policies
    3m 51s
  • Locked
    13. 
    Governance Policy Best Practices
    4m 57s
  • Locked
    14. 
    Course Summary
    1m 15s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE