Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Build Security Incident Response for GDPR Data Protection
Build Security Incident Response for GDPR Data Protection
0_INTRO_incident-response-for-gdpr (1:22)
1.1_Welcome _ Intro (2:07)
1.2_Set your expectations (0:54)
2.1_ What is Incident Response and why do I need it (4:14)
2.2_ Incident Response Team (8:52)
2.4_Types of Security Incidents (8:19)
2.5_Incident Response Tools - general (10:26)
2.6_What is a SIEM (3:05)
2.7_Incident Response Training (5:49)
2.8_What is automation in incident response (8:15)
3.1_What is a NOC (2:37)
3.2_What is a SOC (2:50)
3.3_ Integrated NOC and SOC (6:26)
3.4_Mission_ Team and Required Training (6:39)
3.5_ Types of SOC (3:53)
3.6_Building a SOC (5:39)
3.7_Cheat Sheets to help you in configuring your systems (9:30)
4.1 GDPR intro (2:49)
4.2_GDPR effects on Incident Response (5:42)
4.4_GDPR Incident Response Process (10:13)
4.3_ How to create an effective Incident Response plan (10:49)
4.5_ Lets draft the IRM Procedure (4:30)
4.6_How to treat data breaches (4:55)
5.2_ IRM2 - Windows Intrusion (2:55)
5.3_IRM3 - Unix_Linux Intrusion Detection (2:22)
5.4_IRM4 - DDoS (3:54)
5.5_ IRM5 - Malicious Network Behavior (2:26)
5.6_ IRM6 - Website Defacement (2:22)
5.7_ IRM7 - Windows malware detection (2:35)
5.8_IRM8 - Blackmail (1:55)
5.9_ IRM9 - SmartphoneMalware (2:55)
5.10_IRM10 - Social Engineering (2:55)
5.11_ IRM11 - Information Leakage (2:33)
5.12_ IRM12 - Insider Abuse (1:35)
5.13_IRM13 - Phishing (1:33)
5.14_IRM14 - Scam (1:41)
5.15_ IRM15 - Ransomware (2:02)
6.1_Lessons learned by working in a SOC (8:00)
6.2_A list of open source tools to use (6:09)
6.3 ATP Incident Response (9:15)
7.1_Final thoughts and other documents (1:21)
Teach online with
3.6_Building a SOC
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock