только у нас скачать шаблон dle скачивать рекомендуем

Incident Essentials

Incident Essentials

Incident Essentials

Published 1/2024
Created by Roy Borgen
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 10 Lectures ( 5h 5m ) | Size: 2.22 GB


Mastering Incident Response: Strategy, Forensics, Reporting, and Compliance

What you'll learn:
Identify and categorize various types of cybersecurity incidents and their impacts
Develop tailored incident response strategies for different security breaches
Master evidence collection and forensic techniques, maintaining legal admissibility
Enhance communication skills for effective incident reporting and documentation
Apply incident response knowledge in practical, real-world scenarios
Manage the complete lifecycle of cybersecurity incidents effectively
Understand legal and compliance aspects in cybersecurity incident handling

Requirements:
Familiarity with basic information technology concepts and terminology
A general understanding of cybersecurity principles and threats
The course is designed to be accessible, lowering barriers for beginners interested in cybersecurity incident response

Description:
The Incident Essentials training course is a comprehensive cybersecurity training designed to provide you with the necessary knowledge and skills to build, organize, and manage an effective incident response capability within your organization. Our curriculum combines theoretical and practical lessons based on experience from law enforcement, system administration, and security operations, enabling you to handle cybersecurity incidents with confidence and efficiency. The Incident Essentials training course is specifically designed for technical personnel who play a crucial role in a company's incident response efforts. It is particularly directed towards first responders, such as DevOps, system administrators, and information security personnel, ensuring they have the skills and knowledge needed to effectively handle incidents. Program overview: Lesson 1 - Introduction. Gain an overview of the course objectives and how it will enable participants to build, organize, and manage an effective incident response capability within their organizationLesson 2 - Understanding cybersecurity incidents Learn about the three pillars of information security and the role of security policies in identifying and addressing cyber incidents.Lesson 3 - Implementing an Incident Response Program. Explore key components of a successful incident response plan, including policies, procedures, team selection, and incident prioritization.Lesson 4 - Incident response life cycle. Understand the different phases of the incident response life cycle and the tasks and resources used in each phase for effective incident management.Lesson 5 - Psychological traps of investigations. Examine biases and cognitive traps that can influence decision-making in investigations, and learn strategies to avoid them for more accurate information gathering.Lesson 6 - Evidence collection and processing. Learn the fundamental principles of collecting and handling digital evidence, ensuring its integrity, chain of custody, and admissibility in legal proceedings.Lesson 7 - Volatile Memory Acquisition - How to create a memory dump. Acquire practical skills in creating memory dumps for devices across platforms, including Linux, Windows, and MacOS, while securing volatile memory as evidence.Lesson 8 - Storage Media Forensics Acquisition - A data acquisition guide. Acquire practical skills in creating memory dumps for devices across platforms, including Linux, Windows, and MacOS, while securing volatile memory as evidence.Lesson 9 - Report writing fundamentals. Master the basics of effective report writing for cybersecurity investigations, including structuring, organizing, and ensuring accuracy and objectivity.Lesson 10 - Interviews 101 - A beginner's guide.Learn the fundamentals of conducting effective interviews in cybersecurity investigations, based on the 8-phase interview model adapted from the Norwegian Police.Instructor profile - Meet Roy BorgenMy name is Roy Borgen, and I am the founder and CEO of ShieldTech. I am honored to be your lead instructor throughout this comprehensive training program. I'd like to take a moment to share my background with you, so you can feel confident in the knowledge and experience I bring to this course.​I hold two bachelor's degrees: one in Information Technology with a specialty in Network Administration, and the other in Police Studies from the Norwegian Police University College. Early in my career, I worked as a system administrator, gaining valuable technical experience before joining the Norwegian Police. As a detective, I handled a variety of cases and gained experience in investigations, mobile forensics and securing evidence from mobile devices.​After my time with the police, I transitioned to the private sector, working as an Information Security Analyst for a multinational NASDAQ listed company. My talents were quickly recognized, and I soon became the Security Operations Lead. I played an instrumental role in building the global Security Operations and Security Engineering teams, consisting of employees across multiple countries. These teams were vital in detecting and responding to information security incidents, safeguarding the company, and ensuring compliance with various regulatory bodies.My diverse experience in system administration, detective work, and information security operations has been invaluable in the development of the Incident Essentials training course. My unique background allows me to effectively teach and guide technical personnel, such as DevOps, system administrators, and information security personnel, in handling cybersecurity incidents with confidence and efficiency.​I am excited to share my knowledge and experience with all of you as we embark on this journey

Who this course is for:
IT Professionals: System administrators, network engineers, and security analysts looking to enhance their incident response capabilities.
Cybersecurity Beginners: Individuals with a basic understanding of IT and cybersecurity, eager to delve into incident response
Security Managers: Those responsible for overseeing organizational cybersecurity who need a deeper understanding of incident handling
Technical Support Staff: Support personnel seeking to expand their skills in dealing with security incidents


HOMEPAGE


  https://www.udemy.com/course/incident-essentials/ 


DOWNLOAD


https://rapidgator.net/file/e02a2142e1a551d36a8d510f9d98e1d4/Incident_Essentials.part1.rar.html
https://rapidgator.net/file/95d2bd88bbce825a817352bae21f96e0/Incident_Essentials.part2.rar.html
https://rapidgator.net/file/ac7c902638bf9182f64b6183ffb06b2d/Incident_Essentials.part3.rar.html


https://uploadgig.com/file/download/a03319b75E56c2dd/Incident_Essentials.part1.rar
https://uploadgig.com/file/download/a17C67888b80f7b0/Incident_Essentials.part2.rar
https://uploadgig.com/file/download/6B0e9c380b00016D/Incident_Essentials.part3.rar
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.