About This Course
Who this course is for:
- Incident handlers
- System administrators
- General security engineers
What you’ll learn:
- How to plan, create, and utilize systems in order to prevent, detect, and respond to security breaches.
As a Certified Incident Handler, you are prepared to effectively help incident handlers, system administrators, and general security engineers understand how to plan, create, and utilize their systems in order to prevent, detect, and respond to security breaches.
Every business connected to the internet is getting probed by hackers trying to gain access, making it a necessity to have someone that knows how to detect and resolve security breaches. This certification is ideal for those who lead incident handling teams or are part of an incident handling team.
Our Promise to You
By the end of this course, you will have learned incident handling that will prevent, detect and resolve security breaches.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about incident handling.
Course Curriculum
Section 1 - Module 01 - Course Introduction | |||
Course Introduction | 00:00:00 | ||
Downloadable Materials | 00:00:00 | ||
Section 2 - Module 02 - Threats, Vulnerabilities And Exploits | |||
Threats, Vulnerabilities And Exploits | 00:00:00 | ||
Section 3 - Module 03 - IH Preparation | |||
IH Preparation | 00:00:00 | ||
Section 4 - Module 04 - Request Tracker For Incident Handling | |||
Request Tracker For Incident Handling | 00:00:00 | ||
Section 5 - Module 05 - Preliminary Response | |||
Preliminary Response | 00:00:00 | ||
Section 6 - Module 06 - Identification and Initial Response | |||
Identification And Initial Response | 00:00:00 | ||
Section 7 - Module 07 - Sysinternals | |||
Sysinternals | 00:00:00 | ||
Section 8 - Module 08 - Containment | |||
Containment | 00:00:00 | ||
Section 9 - Module 09 - Eradication | |||
Eradication | 00:00:00 | ||
Section 10 - Module 10 - Follow-up | |||
Follow-up | 00:00:00 | ||
Section 11 - Module 11 - Recovery | |||
Recovery | 00:00:00 | ||
Section 12 - Module 12 - Virtualization Security | |||
Virtualization Security | 00:00:00 | ||
Section 13 - Module 13 - Malware Incident Handling | |||
Malware Incident Handling | 00:00:00 |