5
H
19
M
Time
intermediate
difficulty
5
ceu/cpe
Course Content
Plan of Action and Milestones (POA&Ms)
Recovering from a Cyber Incident
Communicating to Executives
Recovering from a Cyber Incident
Writing an After-Action Report (AAR)
Recovering from a Cyber Incident
Conducting a Debriefing
Recovering from a Cyber Incident
Understanding the Beachhead of the Incident
Recovering from a Cyber Incident
Working with Law Enforcement
Responding to a Cyber Incident
Maintaining Evidence and Chain of Custody
Responding to a Cyber Incident
Mitigation and Disconnect Decisions
Responding to a Cyber Incident
Out of Band and Strategic Communications
Responding to a Cyber Incident
Developing and Deploying IOCs
Responding to a Cyber Incident
Declaring an Incident and Notifications
Responding to a Cyber Incident
Responding to a Cyber Incident
Responding to a Cyber Incident
Metrics for Detecting Incidents
Detecting the Cyber Incident
Information Security Continuous Monitoring (ISCM)
Detecting the Cyber Incident
Incident Response Taxonomy and Triage
Detecting the Cyber Incident
SIEM, SOAR and Security Analytics
Detecting the Cyber Incident
Prevention is Ideal, but Detection is a Must
Detecting the Cyber Incident
Zero Trust Networks (ZTN), Edge Computing and Other Considerations
Protecting an Organization from a Cyber Incident
Service Level Agreements (SLAs) and Metrics to Monitor Protection Abilities
Protecting an Organization from a Cyber Incident
Partnerships Between IT and Security
Protecting an Organization from a Cyber Incident
Resources to Protect an Organization
Protecting an Organization from a Cyber Incident
Before the Incident: Good Cyber Hygiene and Vulnerability Management
Protecting an Organization from a Cyber Incident
Incidents Involving Insider Threats
Identifying Organizational Assets and Risk
Supply Chain Risk Management (SCRM) Considerations
Identifying Organizational Assets and Risk
Risk Assessments and Commercial Threat Intelligence
Identifying Organizational Assets and Risk
Course Description
This course will give students the knowledge necessary to prepare an incident response plan, understand how to triage and categorize events and incidents, define appropriate policies, implement the necessary people, processes, and technologies based upon the risk posture of the organization, understand how to prevent, identify, detect, respond, and recovery from cyber incidents, and how to communicate effective with senior executives during an incident response. Other topics discussed include how to collect digital evidence for potential prosecution or employee disciplinary actions, how to work with external service providers and partners, and how to interface with law enforcement.
Target Audience
This course is intended for individuals who have a foundational understand of incident response. Students who desire to advance within a Security Operations Center (SOC) or those looking at leadership roles such as a SOC manager, Chief Information Security Officer (CISO), or Director of Cybersecurity will benefit from this course. Additionally, those who are outside of IT or cyber but have been involved in incident response from a cursory role (e.g., CIOs, human resources (HR), legal, etc.) and would like a deeper understanding should take this course. If you desire to understand how incidents should be responded to and hear real-life examples of incident responses from an instructor who has responded to thousands of incidents, this is the course for you.