Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Incident Handling and Response
1.Introduction
1.Introduction (6:52)
2.Planning
1.Preparation for people and policy (7:28)
2.Team Management and Building (6:22)
3.Identification
1.Where Does Identification Occur (12:48)
2.What to Check (7:01)
4.Cotaintment
1.Deployment and Categorization (4:42)
2.Short-term and Long-term Actions (5:21)
5.Eradication
Restoring and Improving Defenses (4:45)
6.Recovery
Validation and Monitoring (5:38)
7.Lessons Learned
Meet, Fix, and Share (5:25)
Teach online with
Validation and Monitoring
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock