Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Performing Incident Response and Handling

Course Cover
compare button icon

Course Features

icon

Duration

318 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

318 minutes

Course Description

It is not about "if", it's "when" an attack will occur. There is no way to stop an attacker infiltrating your company, regardless of what you do or know. After accepting that an attack is inevitable, your task now is to "How can I respond?" Here is where an "Incident Responder", comes in. What should you do if a device or system has been targeted? It all depends on what the incident is. This course, Performing Incident Respond and Handling, will help you make sure you and your company are ready. It will also teach you about the various security policies you need to have in place. This will help you clarify and bring attention to the importance of protecting your resources. You'll first learn how to detect incidents and what to do about them. Next, you will learn about the steps security professionals should use to ensure consistency with incidents that affect them as well as future. You'll also learn how to respond to common issues such as DoS, Session Hijacks, and Malicious Code. This course will help you understand how to keep your network secure and be more proactive about monitoring what's going on in your environment.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

By the end of this course, you'll understand what is needed to help keep your network more secure by being more proactive and aware of what's happening in your environment

Finally, you'll dive into some of the more common incidents that take place in your networks by looking at how to handle and respond to issues like a DoS, a Session Hijack, or even Malicious Code

First, you'll learn about the actual process of detecting incidents and how to respond to them

Learning about each of the security policies that you should have in place to clarify and focus everyone on the importance of keeping your resources secure

Next, you'll explore the actual workflow steps that every security professional should follow to make sure you are consistent with all incidents that are currently affecting you as well as future ones

Course Cover