This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Build Security Incident Response for GDPR Data Protection
Build Security Incident Response for GDPR Data Protection
0_INTRO_incident-response-for-gdpr (1:22)
1.1_Welcome _ Intro (2:07)
1.2_Set your expectations (0:54)
2.1_ What is Incident Response and why do I need it (4:14)
2.2_ Incident Response Team (8:52)
2.4_Types of Security Incidents (8:19)
2.5_Incident Response Tools - general (10:26)
2.6_What is a SIEM (3:05)
2.7_Incident Response Training (5:49)
2.8_What is automation in incident response (8:15)
3.1_What is a NOC (2:37)
3.2_What is a SOC (2:50)
3.3_ Integrated NOC and SOC (6:26)
3.4_Mission_ Team and Required Training (6:39)
3.5_ Types of SOC (3:53)
3.6_Building a SOC (5:39)
3.7_Cheat Sheets to help you in configuring your systems (9:30)
4.1 GDPR intro (2:49)
4.2_GDPR effects on Incident Response (5:42)
4.4_GDPR Incident Response Process (10:13)
4.3_ How to create an effective Incident Response plan (10:49)
4.5_ Lets draft the IRM Procedure (4:30)
4.6_How to treat data breaches (4:55)
5.2_ IRM2 - Windows Intrusion (2:55)
5.3_IRM3 - Unix_Linux Intrusion Detection (2:22)
5.4_IRM4 - DDoS (3:54)
5.5_ IRM5 - Malicious Network Behavior (2:26)
5.6_ IRM6 - Website Defacement (2:22)
5.7_ IRM7 - Windows malware detection (2:35)
5.8_IRM8 - Blackmail (1:55)
5.9_ IRM9 - SmartphoneMalware (2:55)
5.10_IRM10 - Social Engineering (2:55)
5.11_ IRM11 - Information Leakage (2:33)
5.12_ IRM12 - Insider Abuse (1:35)
5.13_IRM13 - Phishing (1:33)
5.14_IRM14 - Scam (1:41)
5.15_ IRM15 - Ransomware (2:02)
6.1_Lessons learned by working in a SOC (8:00)
6.2_A list of open source tools to use (6:09)
6.3 ATP Incident Response (9:15)
7.1_Final thoughts and other documents (1:21)
5.12_ IRM12 - Insider Abuse
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock