Companies Home Search Profile

Incident Response Planning

Focused View

Jason Dion

5:37:06

81 View
  • 01 - Overview.mp4
    04:24
  • 02 - Why do you need a plan.mp4
    03:53
  • 03 - Lifecycle of an incident response.mp4
    04:20
  • 04 - Review Introduction.mp4
    07:27
  • 01 - Incident response planning.mp4
    01:21
  • 02 - Events and incidents.mp4
    06:07
  • 03 - Policy, plans, and procedures.mp4
    03:19
  • 04 - Policy elements.mp4
    08:33
  • 05 - Plan elements.mp4
    08:45
  • 06 - Procedure elements.mp4
    05:47
  • 07 - Review Incident response planning.mp4
    03:15
  • 01 - Incident response team.mp4
    02:31
  • 02 - Incident response team structure.mp4
    05:02
  • 03 - Types of teams.mp4
    10:39
  • 04 - Selecting a team model.mp4
    10:17
  • 05 - Team members.mp4
    07:00
  • 06 - Leading a team.mp4
    09:59
  • 07 - Organizational dependencies.mp4
    07:19
  • 08 - Review Incident response team.mp4
    04:05
  • 01 - Communication.mp4
    01:47
  • 02 - Coordinating your efforts.mp4
    08:04
  • 03 - Internal information sharing.mp4
    05:15
  • 04 - Business impact analysis.mp4
    09:21
  • 05 - Technical analysis.mp4
    05:57
  • 06 - External information sharing.mp4
    06:04
  • 07 - Review Communication.mp4
    04:53
  • 01 - Preparation.mp4
    03:30
  • 02 - Communications and facilities.mp4
    09:50
  • 03 - Hardware and software.mp4
    06:45
  • 04 - Technical resources and information.mp4
    08:55
  • 05 - Software resources.mp4
    05:14
  • 06 - Incident prevention.mp4
    11:05
  • 07 - Review Preparation.mp4
    06:14
  • 01 - Detection and analysis.mp4
    04:20
  • 02 - Attack vectors.mp4
    06:52
  • 03 - Detecting an incident.mp4
    06:15
  • 04 - Indicators of compromise.mp4
    06:14
  • 05 - Conducting analysis.mp4
    07:43
  • 06 - Documenting the incident.mp4
    05:28
  • 07 - Prioritizing the incident.mp4
    07:51
  • 08 - Notification procedures.mp4
    03:26
  • 09 - Review Detection and analysis.mp4
    04:44
  • 01 - Containment, eradication, and recovery.mp4
    04:39
  • 02 - Containment strategy.mp4
    07:59
  • 03 - Evidence collection and handling.mp4
    08:58
  • 04 - Identifying the attacker.mp4
    05:52
  • 05 - Eradication and recovery.mp4
    09:42
  • 06 - Review Containment, eradication, and recovery.mp4
    04:00
  • 01 - Post-incident activity.mp4
    02:43
  • 02 - Lessons learned.mp4
    06:32
  • 03 - Metrics and measures.mp4
    06:09
  • 04 - Evidence retention.mp4
    05:38
  • 05 - Calculating the cost.mp4
    05:25
  • 06 - Review Post-incident activity.mp4
    05:17
  • 01 - What to do next.mp4
    04:22
  • Description


    If your organization is the victim of a cyberattack, are you ready to respond? In this course, cybersecurity trainer Jason Dion teaches you how to create, provision, and operate a formal, effective incident response capability within your organization to minimize the damage a cyberattack could cause. Jason guides you through incident response planning, including events, incidents, policies, plans, and procedures. He covers gathering and training your incident response team, as well as establishing and maintaining needed communications. Jason guides you through preparing for an incident and explains how to detect and analyze an incident. Plus, he goes over containment, eradication, recovery, and post-incident activities. Jason fully covers the guidance provided in the NIST SP 800-61, as well as recommendations based upon practical experience from the field.

    This course was created by Jason Dion. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges. Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 55
    • duration 5:37:06
    • English subtitles has
    • Release Date 2023/04/11