About This Course
As a Certified Incident Handler, you are prepared to effectively help incident handlers, system administrators, and general security engineers understand how to plan, create, and utilize their systems in order to prevent, detect, and respond to security breaches.
Every business connected to the internet is getting probed by hackers trying to gain access, making it a necessity to have someone that knows how to detect and resolve security breaches. This certification is ideal for those who lead incident handling teams or are part of an incident handling team.
Our Promise to You
By the end of this course, you will have learned incident handling that will prevent, detect and resolve security breaches.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about incident handling.
|Section 1 - Module 01 - Course Introduction|
|Section 2 - Module 02 - Threats, Vulnerabilities And Exploits|
|Threats, Vulnerabilities And Exploits||00:00:00|
|Section 3 - Module 03 - IH Preparation|
|Section 4 - Module 04 - Request Tracker For Incident Handling|
|Request Tracker For Incident Handling||00:00:00|
|Section 5 - Module 05 - Preliminary Response|
|Section 6 - Module 06 - Identification and Initial Response|
|Identification And Initial Response||00:00:00|
|Section 7 - Module 07 - Sysinternals|
|Section 8 - Module 08 - Containment|
|Section 9 - Module 09 - Eradication|
|Section 10 - Module 10 - Follow-up|
|Section 11 - Module 11 - Recovery|
|Section 12 - Module 12 - Virtualization Security|
|Section 13 - Module 13 - Malware Incident Handling|
|Malware Incident Handling||00:00:00|