PDP Url

Planning a Security Incident Response

This course details the recommended processes and procedures to plan for and use when responding to enterprise security intrusions.

Self-Paced

Learning Style

Intermediate

Difficulty

16 Hours

Course Duration

Course Info

Download PDF

Certificate

See Sample

About Individual Course:
  • Individual course plan gives you access to this course
$99.00
$99.00
/ Each
When you subscribe, you get:
Learn Subscription plan gives you access to this course and over 841 other popular courses
On Sale!
Now Only $39.99 Regular Price $44.99
Now Only $39.99 Regular Price $44.99
/ Month
Team
Pricing
  • Buy 5-9 Enrollments And Save 68% ($12.74 monthly.)
  • Buy 10-19 Enrollments And Save 72% ($11.24 monthly.)
  • Buy 20-above Enrollments And Save 78% ($8.99 monthly.)
This course details the recommended processes and procedures to plan for and use when responding to enterprise security intrusions.

Course Information

About this course:

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Course Objective:

After completing this course, students will be able to:

  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • List appropriate post-incident activities

Audience:

  • IT Support officer
  • Cybersecurity officer
  • Cybersecurity professional

Prerequisite:

  • A understanding of the current cybersecurity ecosystem.

Outline

Course Endorsed By:

Author

Michael Redman

CISSP, CISM, CISA, CEHv10, CCNA(ex), CASP (qualified), CompTIA Security+, CompTIA Linux+

Michael has served as the Sr. cybersecurity advisor to 2 and 3 Star commander(s) and senior executive management regarding advanced techniques and developments in the Information Assurance / Cyber Security arena of Automated Information Systems (AIS). Responsible to both identify risk and recommend appropriate countermeasure within the enclave and isolated computing environments of the DoD.

More Information

More Information
Brand Microsoft
Subjects Information Security
Lab Access No
Technology Microsoft
Learning Style Self-Paced Learning
Difficulty Intermediate
Course Duration 16 Hours
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here