Companies Home Search Profile

Certified Information Security Manager (CISM) Cert Prep (2022): 4 Incident Management

Focused View

Mike Chapple

2:20:34

187 View
  • 01.01-incident management.mp4
    00:55
  • 01.02-what you need to know.mp4
    00:40
  • 01.03-study resources.mp4
    01:23
  • 02.01-role of a manager in incident response.mp4
    02:20
  • 02.02-creating an incident response team.mp4
    02:15
  • 03.01-identifying and classifying security incidents.mp4
    03:29
  • 03.02-threat classification.mp4
    04:05
  • 03.03-zero days and the advanced persistent threat.mp4
    03:25
  • 03.04-determining incident severity.mp4
    04:04
  • 04.01-build an incident response program.mp4
    04:13
  • 04.02-incident communications plan.mp4
    02:42
  • 04.03-incident identification.mp4
    04:26
  • 04.04-escalation and notification.mp4
    02:29
  • 04.05-mitigation.mp4
    02:22
  • 04.06-containment techniques.mp4
    03:00
  • 04.07-incident eradication and recovery.mp4
    05:28
  • 04.08-validation.mp4
    02:24
  • 04.09-post-incident activities.mp4
    03:50
  • 04.10-incident response exercises.mp4
    01:37
  • 05.01-network symptoms.mp4
    04:30
  • 05.02-rogue access points and evil twins.mp4
    02:50
  • 05.03-endpoint symptoms.mp4
    03:03
  • 05.04-application symptoms.mp4
    02:17
  • 06.01-conducting investigations.mp4
    03:50
  • 06.02-evidence types.mp4
    03:28
  • 06.03-introduction to forensics.mp4
    03:21
  • 06.04-system and file forensics.mp4
    04:26
  • 06.05-file carving.mp4
    03:46
  • 06.06-creating forensic images.mp4
    05:30
  • 06.07-digital forensics toolkit.mp4
    02:25
  • 06.08-operating system analysis.mp4
    06:09
  • 06.09-password forensics.mp4
    07:16
  • 06.10-network forensics.mp4
    04:01
  • 06.11-software forensics.mp4
    04:25
  • 06.12-mobile device forensics.mp4
    01:10
  • 06.13-embedded device forensics.mp4
    02:30
  • 06.14-chain of custody.mp4
    01:51
  • 06.15-ediscovery and evidence production.mp4
    03:03
  • 06.16-exploitation frameworks.mp4
    06:04
  • 07.01-security information and event management.mp4
    04:08
  • 07.02-continuous security monitoring.mp4
    04:13
  • 08.01-continuing your studies.mp4
    01:11
  • Description


    Even the best security controls aren't foolproof. That's why security professionals need a solid incident management plan. The fourth domain of the Certified Information Security Manager (CISM) exam—Information Security Incident Management—tests your mastery of this important topic. Take this CISM Cert Prep course to study for the exam and gain a deeper understanding of how your team should react to and resolve a security incident, whether it's an attack on your network, an email-born virus, or data theft. Instructor Mike Chapple explains how to identify, triage, and respond to an event, minimizing the damage and maximizing your ability to find the root cause, so you can resume normal operations. He also provides tips for logging and monitoring ongoing security-related events. Each topic maps to a relevant objective from the CISM certification exam.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 42
    • duration 2:20:34
    • Release Date 2023/04/27

    Courses related to Information Security