Responding to Cybersecurity IncidentsThis course teaches how to design and implement a system to respond to urgent situations by mitigating immediate and potential threats, contain and mitigate incidents using various methods and devices, and prepare to move from the incident response phase to the post-mortem forensic investigation phase.
Course descriptionNow that you've performed a comprehensive analysis of your network and other assets, you need to prepare for what much of this analysis will reveal—the reality of a security incident affecting your organization. Responding quickly, yet cautiously, to the inevitable can make all the difference in preventing serious, long-term harm to the organization.
Prepare for Forensic Investigation as a CSIRT
Video - 00:03:00
This video discuses forensic investigation techniques and tools.
Contain and Mitigate Incidents
Video - 00:17:00
This video discusses deploying your CIRT in an actual event or incident.
Deploy an Incident Handling and Response Architecture
Video - 00:27:00
This video covers establishing a Cyber Incident Response Team and creating a incident response plan.
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
Plans & pricing
- Team administration and reporting
- Dedicated client success manager
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps