This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Incident Handling and Response
1.Introduction
1.Introduction (6:52)
2.Planning
1.Preparation for people and policy (7:28)
2.Team Management and Building (6:22)
3.Identification
1.Where Does Identification Occur (12:48)
2.What to Check (7:01)
4.Cotaintment
1.Deployment and Categorization (4:42)
2.Short-term and Long-term Actions (5:21)
5.Eradication
Restoring and Improving Defenses (4:45)
6.Recovery
Validation and Monitoring (5:38)
7.Lessons Learned
Meet, Fix, and Share (5:25)
2.What to Check
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock