Course

Introduction to Incident Response

Review the fundamentals of incident response and learn how to build an IR team and effective playbook for handling incidents.
56 minutes 6 videos

Course description

In this course, we will dig into the NIST phases of incident response. We will also talk about business continuity and DR, specifically how it relates to incident response. Lastly, we dig into creating a playbook that fits your organization and its business needs. We also address the team required to realize the playbook and policies.

Syllabus

Welcome to Incident Response!

Video - 00:01:00

Building an IR Team

Video - 00:06:00

How to properly build an incident response team.
Building an IR Playbook

Video - 00:10:00

A discussion of how to create an IR playbook.
Business Continuity and Disaster Recovery Roles

Video - 00:07:00

How business continuity and disaster recovery applies.
The NIST 5 Phases of Incident Response

Video - 00:19:00

A breakdown of the 5 phases of IR, per NIST.
The Value of Incident Response and Fundamentals

Video - 00:13:00

Learn the fundamentals of IR and why it's important.

Meet the author

Keatron Evans is a cybersecurity and workforce development expert with over 17 years of experience in penetration testing, incident response and information security management for federal agencies and Fortune 500 organizations. He is VP of Portfolio and Product Strategy at Infosec, where he empowers the human side of cybersecurity with cyber knowledge and skills to outsmart cybercrime. Keatron is an established researcher, instructor and speaker — and lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish. He regularly speaks at major industry events like RSA and serves as a cybersecurity subject matter expert for major media outlets like CNN, Fox News, Information Security Magazine and more.

Keatron holds a Bachelor of Science in Business Information Systems and dozens of cybersecurity certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP) and Licensed Penetration Tester (LTP). When not teaching, speaking or managing his incident response business, KM Cyber Security LLC, Keatron enjoys practicing various martial arts styles, playing piano and bass guitar, and spending time with his family.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Law Enforcement / Counterintelligence Forensics Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training you can trust