This Course is part of a Career Path: Become a System Administrator

Course Content

Module 1: Introduction to Incident Response

08:41
1.1 An Overall View of the Course
10:16
1.2 The Humans Behind Cyber Security Incidents
08:35
1.3 The Sony Hack Case Study

Module 2: Incident Response Policy

07:41
2.1 An Overview of Incident Response Policy
10:39
2.2 The Elements of an Incident Response Policy
07:21
2.3 The Role of Communication with Law Enforcement when it comes to security
09:41
2.4 The Different Types of Incident Response Teams
07:35
2.5 Outsourcing Considerations
09:11
2.6 The Role of the Incident Response Manager
04:49
2.7 What does an Incident Response team do?

Module 3: Incident Handling

09:37
3.1 An Introduction to Incident Handling
09:02
3.2 CIRC Team Composition
05:53
3.3 Incident Response Policies
08:41
3.4 The REACT Principle
07:39
3.5 Maintaining the Integrity of the Scene following an incident
10:16
3.6 The Content of Notice
06:49
3.7 The Respond Part of Incident Response

Module 4: Legal Aspects of Incident Response

08:03
4.1 An Introduction to legal considerations of incident response
09:17
4.2 Expectation of Privacy
09:54
4.3 Personally Identifiable Information (PII)
10:16
4.4 Giving notice to individuals
06:07
4.5 Benefits of Information Sharing

Module 5: Forensics of Incident Response

07:59
5.1 Forensics in Support of an Incident Response
08:40
5.2 The Phases of Investigation
10:12
5.3 The Preservation Phase of Investigation
09:04
5.4 Keys of Preservation
08:13
5.5 Volatile Data Considerations
08:01
5.6 Capturing the data
10:36
5.7 Imaging concepts
12:37
5.8 Volatile Memory Capture
10:41
5.9 Forensics in Support of Incident Response
09:27
5.10 Formatting a disk for Incident Response
09:01
5.11 Using the FTK Imaging Software
08:24
5.12 The Forensic Acquisition of Data from a PC
10:41
5.13 Navigating the H Drive
05:57
5.14 Obtaining the Windows Bitlocker Encryption Keys
05:20
5.15 Obtaining the Windows Bitlocker Encryption Keys (continued)
13:13
5.16 The Autopsy Program

Module 6: Insider Threat

10:55
6.1 What is Insider Threat?
04:24
6.2 American Superconductor Case Study
15:32
6.3 Indicators to identify an insider threat
08:15
6.4 Using Automated processes to look for indicators of in insider threats
08:32
6.5 Policy Enforcement
08:52
6.6 Policies and procedures
09:29
6.7 Policies and procedures (continued)
08:24
6.8 Policies and procedures (continued)

Module 7: Malware

09:28
7.1 Malware incidents
07:04
7.2 Setting up a Virtual Machine
09:42
7.3 Dynamic Analysis

Module 8: Incident Recovery

14:10
8.1 Incident Recovery
07:35
8.2 Resiliency: The Answer to the Cyber Security Paradox

Course Description

This online Incident Response and Handling training was designed to provide all of those who lack intel on business protection plans with more than enough understanding on how to properly design, develop and implement a security incident response plan.

About Incident Response and Handling Training


Data breaches are everywhere, and they're showing no signs of slowing down. In fact, experts say that a business' chance of experiencing at least one data breach has neared statistical certainty. Internal and external threats pose big risks to big data housed within private and public organizations. Assuming that your company will be compromised at some point is smart. But do you know what smart decisions to make after the fact? Are you prepared to handle it?

Our self-paced online Incident Response and Handling training prepares you for all of that. You'll learn how to develop three important protection plans for incident response: a business impact analysis, a business continuity plan and a disaster recovery plan. Additionally, you'll learn about the recovery time objective, an important metric for recovering damaged and/or lost data. You should never be unprepared for disaster. Stay one step ahead with free online Incident Response and Handling training.

If you enjoy this course, be sure to check out the rest of our course catalog...where everything is still completely FREE.

Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you can earn cybytes!