Policy & Governance: Incident Response
SecOps
| Intermediate
- 14 videos | 1h 9m 54s
- Includes Assessment
- Earns a Badge
Learners can explore the creation, adoption, and use of an IRP (Incident Response Plan) in this 14-video course, which examines the purpose and objectives of an IPR, and how it incorporates the objectives of an organization. You will learn how to draft an IRP, and examine the six stages of incident response: preparation, identification, containment, eradication, recovery, and lessons learned. Next, you will examine several tools that are available for incident response strategies, including Sleuth Kit, Metasploit, Websense, and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams), team roles, their purpose, and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements, and will examine the international standard, ISO 27001. You will examine governance policy to direct and control IT security. Finally, you will learn to use governance polices to create incident response policies, and you will learn the elements and best practices for creating a plan.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe elements of an incident response policy and how it governs an incident response teamdescribe the incident phases that an incident policy must address and the six stages in an incident response policydescribe the tools available in incident response strategies including the three As in incident response and the OODA Loopdescribe how incident response is managed across various enterprise organizations, providing examples of cases where incident response policies are manageddescribe how an incident response plan is created and what to include in it, including planning scenarios and recovery objectivesdescribe the concept of a Computer Security Incident Response Team, what a team is compromised of, models and their purpose, and the benefits of outsourcing and having a CSIRT internally
-
recognize what roles to assign to each member of an incident response team and describe how team members would be engaged in various scenariosdescribe different incidence response scenarios and how an organization should respond with their incident response teamdescribe governance policy, roles and responsibilities, and them purpose of incident response planningdescribe ISO 27001 and other various compliance standards, as well as how they are applied in incident responseuse governance policies to effectively create policies in incident responsedescribe best practices and scenarios for establishing an incident response governance policy for several business and information sectorssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 22sUP NEXT
-
2.Incident Response Policy Overview4m 31s
-
3.Incident Response Stages6m
-
4.Tools in Incident Response10m 52s
-
5.Cyber Incident Response Management5m 48s
-
6.Drafting an Incident Response Plan5m 35s
-
7.Computer Security Incident Response Team5m 28s
-
8.CSIRT Roles5m 9s
-
9.Understanding Incident Response in Various Scenarios6m 21s
-
10.Purpose of a Governance Policy4m 27s
-
11.ISO and Other Compliance Standards4m 18s
-
12.Governing Incident Response Policies3m 51s
-
13.Governance Policy Best Practices4m 57s
-
14.Course Summary1m 15s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.