Free
Incident Response Lifecycle
Want to build on your foundational knowledge of cybersecurity incident response? By taking this Incident Response Lifecycle course, you will learn how to prepare an incident response plan, triage and categorize events, recover from cyber incidents, and effectively report on incidents to senior executives.
5
H
19
M
Time
intermediate
difficulty
5
ceu/cpe
Course Content
Conclusion
Conclusion
Introduction
Introduction
Why Organizations must have an Incident Response Plan
Preparing an Organization for a Cyber Incident
Enterprise Risk Management (ERM) and Business Decisions that Organizations Must Make
Identifying Organizational Assets and Risk
Before the Incident: Good Cyber Hygiene and Vulnerability Management
Protecting an Organization from a Cyber Incident
Prevention is Ideal, but Detection is a Must
Detecting the Cyber Incident
Responding to a Cyber Incident
Responding to a Cyber Incident
Understanding the Beachhead of the Incident
Recovering from a Cyber Incident
The Typical Parts to an Enterprise IR Plan
Preparing an Organization for a Cyber Incident
You Can't Protect what you Don't Know About
Identifying Organizational Assets and Risk
Resources to Protect an Organization
Protecting an Organization from a Cyber Incident
SIEM, SOAR and Security Analytics
Detecting the Cyber Incident
Declaring an Incident and Notifications
Responding to a Cyber Incident
Conducting a Debriefing
Recovering from a Cyber Incident
Stakeholders Governance and Executive Buy-in
Preparing an Organization for a Cyber Incident
Risk Assessments and Commercial Threat Intelligence
Identifying Organizational Assets and Risk
Partnerships Between IT and Security
Protecting an Organization from a Cyber Incident
Incident Response Taxonomy and Triage
Detecting the Cyber Incident
Developing and Deploying IOCs
Responding to a Cyber Incident
Writing an After-Action Report (AAR)
Recovering from a Cyber Incident
Regulatory and Legal Considerations
Preparing an Organization for a Cyber Incident
Supply Chain Risk Management (SCRM) Considerations
Identifying Organizational Assets and Risk
Service Level Agreements (SLAs) and Metrics to Monitor Protection Abilities
Protecting an Organization from a Cyber Incident
Information Security Continuous Monitoring (ISCM)
Detecting the Cyber Incident
Out of Band and Strategic Communications
Responding to a Cyber Incident
Course Description
This course will give students the knowledge necessary to prepare an incident response plan, understand how to triage and categorize events and incidents, define appropriate policies, implement the necessary people, processes, and technologies based upon the risk posture of the organization, understand how to prevent, identify, detect, respond, and recovery from cyber incidents, and how to communicate effective with senior executives during an incident response. Other topics discussed include how to collect digital evidence for potential prosecution or employee disciplinary actions, how to work with external service providers and partners, and how to interface with law enforcement.
Target Audience
This course is intended for individuals who have a foundational understand of incident response. Students who desire to advance within a Security Operations Center (SOC) or those looking at leadership roles such as a SOC manager, Chief Information Security Officer (CISO), or Director of Cybersecurity will benefit from this course. Additionally, those who are outside of IT or cyber but have been involved in incident response from a cursory role (e.g., CIOs, human resources (HR), legal, etc.) and would like a deeper understanding should take this course. If you desire to understand how incidents should be responded to and hear real-life examples of incident responses from an instructor who has responded to thousands of incidents, this is the course for you.