SRE Emergency & Incident Response: Incident Response
SRE
| Intermediate
- 17 Videos | 1h 24m 38s
- Includes Assessment
- Earns a Badge
A well-prepared and organized approach is key to addressing and managing the aftermath of a system failure, security breach, or cyberattack. In this course, you'll explore the fundamental principles an SRE needs to be familiar with when responding to and managing incidents. You'll identify the goals, requirements, best practices, and key players involved in incident management. You'll learn how to deal with managed and unmanaged incidents and what's involved in an incident response plan. You'll identify incident response roles and responsibilities, and how to use incident metrics to manage incidents at scale. You'll outline what's involved in establishing a computer security incident response team (CSIRT), including each key team member's roles and responsibilities. Lastly, you'll examine what goes into an incident response policy.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursesummarize the requirements, goals, best practices, job roles, and tools involved in managing and responding to incidentsrecognize the importance of incident response planning and the characteristics of incidence response plansdescribe what is meant by each one of the 'three Cs' of incident management (coordinate, communicate, and control)restate the duties of the prominent job roles involved in incident response (Incident Commander, Communications Lead, and Operations Lead) as well as those of other, supporting rolesrecognize the best practices for handling managed incidentsrecognize the best practices for handling unmanaged incidentsdescribe why correctly declaring and classifying incidents is essential and when these activities should be carried outassess why incident response training is necessary and list the responsibilities of an incident response analyst
-
outline tips and strategies for incident response preparationoutline how to go about practicing incident management processes and describe why these activities are importantoutline how to use incident management data for measuring team performance and identify the KPIs to look out fordifferentiate between the standard tools used for incident responsejudge when to create a CSIRT and choose who should be on that teamidentify the different purposes of the various roles on a CSIRTdescribe the elements of an incident response policysummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 47sUP NEXT
-
2.Incident Management6m 29s
-
3.Incident Response Plans5m 4s
-
4.Incident Command Systems4m 34s
-
5.Incident Response Roles4m 21s
-
6.Managed Incidents4m 27s
-
7.Unmanaged Incidents5m 52s
-
8.Declaring Incidents6m 29s
-
9.Incident Response Training4m 27s
-
10.Preparing for Incidence Response5m 40s
-
11.Incident Management Practice Exercises6m 10s
-
12.Incident Management Data5m 26s
-
13.Incident Response Tools6m 29s
-
14.Computer Security Incident Response Teams (CSIRTs)6m 51s
-
15.CIRT Roles and Responsibilities4m 7s
-
16.Incident Response Policies4m 59s
-
17.Course Summary1m 27s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.