Companies Home Search Profile

Performing Incident Response and Handling

Focused View

Dale Meredith

5:18:22

18 View
  • 01-01 - Course Overview -- Course Overview.mp4
    03:30
  • 02-01 - Preparing for Incident Response and Handling -- Course Introduction.mp4
    06:42
  • 02-02 - Preparing for Incident Response and Handling -- Security Policies and Their Goals.mp4
    07:12
  • 02-03 - Preparing for Incident Response and Handling -- Characteristics and Implementation.mp4
    04:13
  • 02-04 - Preparing for Incident Response and Handling -- Access Control Policy.mp4
    01:56
  • 02-05 - Preparing for Incident Response and Handling -- Acceptable Use Policy.mp4
    01:40
  • 02-06 - Preparing for Incident Response and Handling -- Administrative Security Policy.mp4
    02:29
  • 02-07 - Preparing for Incident Response and Handling -- Asset Control Policy.mp4
    02:03
  • 02-08 - Preparing for Incident Response and Handling -- Audit Trail Policy.mp4
    02:08
  • 02-09 - Preparing for Incident Response and Handling -- Logging Policy.mp4
    01:56
  • 02-10 - Preparing for Incident Response and Handling -- Documentation Policy.mp4
    02:36
  • 02-11 - Preparing for Incident Response and Handling -- Evidence Collection Policy.mp4
    02:01
  • 02-12 - Preparing for Incident Response and Handling -- Evidence Preservation Policy.mp4
    02:13
  • 02-13 - Preparing for Incident Response and Handling -- Information Security Policy.mp4
    01:34
  • 02-14 - Preparing for Incident Response and Handling -- NIACAP, IA, and CA Policy.mp4
    01:14
  • 02-15 - Preparing for Incident Response and Handling -- Physical Security Policy.mp4
    02:00
  • 02-16 - Preparing for Incident Response and Handling -- Physical Security Guidelines.mp4
    01:22
  • 02-17 - Preparing for Incident Response and Handling -- The Law in a Digital World.mp4
    04:07
  • 02-18 - Preparing for Incident Response and Handling -- Summary.mp4
    01:32
  • 03-01 - Incident Response Processes -- What We're Going to Learn.mp4
    00:58
  • 03-02 - Incident Response Processes -- What Is a Computer Security Incident.mp4
    03:23
  • 03-03 - Incident Response Processes -- How Do We Identify an Incident.mp4
    03:44
  • 03-04 - Incident Response Processes -- How Do We Handle an Incident.mp4
    01:29
  • 03-05 - Incident Response Processes -- So What's the Goal.mp4
    02:12
  • 03-06 - Incident Response Processes -- What's the Plan.mp4
    02:56
  • 03-07 - Incident Response Processes -- Information Warefare.mp4
    03:59
  • 03-08 - Incident Response Processes -- Vulnerability, Attacks, and Threats.mp4
    05:54
  • 03-09 - Incident Response Processes -- Signs of an Incident.mp4
    09:47
  • 03-10 - Incident Response Processes -- How Do We Respond.mp4
    04:05
  • 03-11 - Incident Response Processes -- The Team.mp4
    03:31
  • 03-12 - Incident Response Processes -- What Did We Learn.mp4
    01:16
  • 04-01 - The Workflow of Incident Response -- Understanding the Workflow.mp4
    03:08
  • 04-02 - The Workflow of Incident Response -- Identification.mp4
    04:46
  • 04-03 - The Workflow of Incident Response -- Incident Recording.mp4
    01:04
  • 04-04 - The Workflow of Incident Response -- Initial Response.mp4
    01:59
  • 04-05 - The Workflow of Incident Response -- Communicating the Incident.mp4
    01:09
  • 04-06 - The Workflow of Incident Response -- Containment.mp4
    02:56
  • 04-07 - The Workflow of Incident Response -- Formulating a Response Strategy.mp4
    02:49
  • 04-08 - The Workflow of Incident Response -- Incident Classification.mp4
    01:46
  • 04-09 - The Workflow of Incident Response -- Incident Investigation.mp4
    01:18
  • 04-10 - The Workflow of Incident Response -- Data Collection.mp4
    01:40
  • 04-11 - The Workflow of Incident Response -- Forensic Analysis.mp4
    02:07
  • 04-12 - The Workflow of Incident Response -- Evidence Protection.mp4
    02:22
  • 04-13 - The Workflow of Incident Response -- Notifying External Agencies.mp4
    00:53
  • 04-14 - The Workflow of Incident Response -- Eradication.mp4
    05:42
  • 04-15 - The Workflow of Incident Response -- System Recovery.mp4
    01:43
  • 04-16 - The Workflow of Incident Response -- Incident Documentation.mp4
    01:42
  • 04-17 - The Workflow of Incident Response -- Incident Damage and Cost Assessment.mp4
    01:48
  • 04-18 - The Workflow of Incident Response -- Review and Update the Response Policies.mp4
    01:17
  • 04-19 - The Workflow of Incident Response -- What Did We Learn.mp4
    00:35
  • 05-01 - Networks and Host Attacks -- What We're Going to Learn.mp4
    00:38
  • 05-02 - Networks and Host Attacks -- Denial of Service Handling.mp4
    04:31
  • 05-03 - Networks and Host Attacks -- Denial of Service Detection.mp4
    05:21
  • 05-04 - Networks and Host Attacks -- Denial of Service Handling.mp4
    02:40
  • 05-05 - Networks and Host Attacks -- Denial of Service Responding.mp4
    02:20
  • 05-06 - Networks and Host Attacks -- Denial of Service Prevention.mp4
    02:21
  • 05-07 - Networks and Host Attacks -- Denial of Service Containment.mp4
    02:41
  • 05-08 - Networks and Host Attacks -- Denial of Service Best Practices.mp4
    01:24
  • 05-09 - Networks and Host Attacks -- Unauthorized Access Handling.mp4
    06:45
  • 05-10 - Networks and Host Attacks -- Unauthorized Access Signs of a Root Compromise.mp4
    04:17
  • 05-11 - Networks and Host Attacks -- Unauthorized Access Hardware.mp4
    02:21
  • 05-12 - Networks and Host Attacks -- Unauthorized Access Responding.mp4
    01:31
  • 05-13 - Networks and Host Attacks -- Unauthorized Access Prevention.mp4
    04:25
  • 05-14 - Networks and Host Attacks -- Unauthorized Access Responding.mp4
    01:44
  • 05-15 - Networks and Host Attacks -- Unauthorized Access Eradicate and Recovery.mp4
    01:20
  • 05-16 - Networks and Host Attacks -- Unauthorized Access Best Practices.mp4
    02:32
  • 05-17 - Networks and Host Attacks -- Inappropriate Usage Detecting.mp4
    03:42
  • 05-18 - Networks and Host Attacks -- Inappropriate Usage Prevention.mp4
    02:45
  • 05-19 - Networks and Host Attacks -- Inappropriate Usage Containment.mp4
    01:19
  • 05-20 - Networks and Host Attacks -- Multiple Components Issues Handling.mp4
    01:51
  • 05-21 - Networks and Host Attacks -- Multiple Components Issues Responding.mp4
    01:04
  • 05-22 - Networks and Host Attacks -- What Did We Learn.mp4
    01:29
  • 06-01 - Service and Application Attacks -- _What We're Going to Learn.mp4
    00:58
  • 06-02 - Service and Application Attacks -- Service and Application Monitoring.mp4
    01:52
  • 06-03 - Service and Application Attacks -- Some Symptoms Services.mp4
    02:09
  • 06-04 - Service and Application Attacks -- Demo Checking Services.mp4
    08:20
  • 06-05 - Service and Application Attacks -- Demo Application Error Monitoring.mp4
    04:17
  • 06-06 - Service and Application Attacks -- Analysis Applications.mp4
    01:20
  • 06-07 - Service and Application Attacks -- Service and Application Response and Restore.mp4
    01:47
  • 06-08 - Service and Application Attacks -- Detecting the Attacks Applications.mp4
    04:06
  • 06-09 - Service and Application Attacks -- Types of Attacks Session Hijacking.mp4
    01:31
  • 06-10 - Service and Application Attacks -- Demo Session Hijack.mp4
    03:30
  • 06-11 - Service and Application Attacks -- Symptoms Session Hijacking.mp4
    04:23
  • 06-12 - Service and Application Attacks -- Defense Session Hijacking.mp4
    02:32
  • 06-13 - Service and Application Attacks -- When It Happens Session Hijacking.mp4
    01:10
  • 06-14 - Service and Application Attacks -- Types of Attacks Command Injection.mp4
    05:34
  • 06-15 - Service and Application Attacks -- Defense SQL Injections.mp4
    02:51
  • 06-16 - Service and Application Attacks -- When It Happens SQL Injection.mp4
    02:23
  • 06-17 - Service and Application Attacks -- Types of Attacks XSS Attacks.mp4
    01:08
  • 06-18 - Service and Application Attacks -- What Attackers Are Looking For XSS Attacks.mp4
    02:49
  • 06-19 - Service and Application Attacks -- Types of XSS Attacks.mp4
    01:46
  • 06-20 - Service and Application Attacks -- Tools XSS Attacks.mp4
    01:09
  • 06-21 - Service and Application Attacks -- Defense XSS Attacks.mp4
    02:43
  • 06-22 - Service and Application Attacks -- When It Happens XSS Attacks.mp4
    01:03
  • 06-23 - Service and Application Attacks -- Types of Attacks Buffer Overflow.mp4
    02:29
  • 06-24 - Service and Application Attacks -- Types of Buffer Overflows.mp4
    01:10
  • 06-25 - Service and Application Attacks -- Tools Buffer Overflows.mp4
    01:59
  • 06-26 - Service and Application Attacks -- Defense Buffer Overflows.mp4
    02:42
  • 06-27 - Service and Application Attacks -- When It Happens Buffer Overflows.mp4
    01:07
  • 06-28 - Service and Application Attacks -- What Did We Learn.mp4
    01:19
  • 07-01 - Malicious Code and Insider Threats -- What We're Going to Learn.mp4
    01:13
  • 07-02 - Malicious Code and Insider Threats -- Malicious Code Virus and Worms.mp4
    02:19
  • 07-03 - Malicious Code and Insider Threats -- Malicious Code Trojans and Spyware.mp4
    02:35
  • 07-04 - Malicious Code and Insider Threats -- Malicious Code What to Do.mp4
    04:00
  • 07-05 - Malicious Code and Insider Threats -- Malicious Code What Are the Signs.mp4
    02:02
  • 07-06 - Malicious Code and Insider Threats -- Malicious Code Containment.mp4
    03:10
  • 07-07 - Malicious Code and Insider Threats -- Malicious Code Gather Evidence.mp4
    01:48
  • 07-08 - Malicious Code and Insider Threats -- Malicious Code Bots and Botnets.mp4
    02:37
  • 07-09 - Malicious Code and Insider Threats -- Malicious Code How Bots and Botnets Work.mp4
    05:11
  • 07-10 - Malicious Code and Insider Threats -- Incident Response Handling Performing.mp4
    02:18
  • 07-11 - Malicious Code and Insider Threats -- Malicious Code Rootkits in Windows.mp4
    02:54
  • 07-12 - Malicious Code and Insider Threats -- Malicious Code Rootkits - Kernel Mode.mp4
    01:06
  • 07-13 - Malicious Code and Insider Threats -- When It Happens Rootkits.mp4
    01:59
  • 07-14 - Malicious Code and Insider Threats -- Prevention Rootkits.mp4
    03:22
  • 07-15 - Malicious Code and Insider Threats -- Insider Threats The Landscape.mp4
    01:42
  • 07-16 - Malicious Code and Insider Threats -- Insider Threats The Workflow.mp4
    01:12
  • 07-17 - Malicious Code and Insider Threats -- Insider Threats Detection and Response.mp4
    02:55
  • 07-18 - Malicious Code and Insider Threats -- Insider Threats Prevention - Network Level.mp4
    01:30
  • 07-19 - Malicious Code and Insider Threats -- Insider Threats Prevention - Access Control.mp4
    01:31
  • 07-20 - Malicious Code and Insider Threats -- Insider Threats Prevention - Awareness Program.mp4
    01:42
  • 07-21 - Malicious Code and Insider Threats -- Insider Threats Prevention - Admins and Privileged Users.mp4
    02:47
  • 07-22 - Malicious Code and Insider Threats -- Insider Threats Prevention - Backups.mp4
    01:33
  • 07-23 - Malicious Code and Insider Threats -- What Did We Learn.mp4
    01:22
  • Description


    In this course, you’ll explore and investigate into the countless aspects of incident response and how you can plan and design a process for responding to that breach that is coming sooner or later to your organization.

    What You'll Learn?


      It’s not a matter of “if”, but rather “when” an attack is going to happen. No matter what you know or do, the hard truth is there's no guaranteed way to stop an attacker from penetrating your organization. Once you’ve accepted that an attack will be unavoidable, your job now becomes "How do I respond to these situations?". This is where the role of an "Incident Responder" comes into play. What do you do when a system or device has been targeted? Well, that depends on the incident itself. In this course, Performing Incident Response and Handling, you'll start by making sure that you and your organization are prepared by learning about each of the security policies that you should have in place to clarify and focus everyone on the importance of keeping your resources secure. First, you'll learn about the actual process of detecting incidents and how to respond to them. Next, you'll explore the actual workflow steps that every security professional should follow to make sure you are consistent with all incidents that are currently affecting you as well as future ones. Finally, you'll dive into some of the more common incidents that take place in your networks by looking at how to handle and respond to issues like a DoS, a Session Hijack, or even Malicious Code. By the end of this course, you'll understand what is needed to help keep your network more secure by being more proactive and aware of what's happening in your environment.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 123
    • duration 5:18:22
    • level preliminary
    • Release Date 2023/10/15

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security