Coursera
Coursera Logo

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery 

  • Offered byCoursera

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
 at 
Coursera 
Overview

Duration

23 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 3 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Beginner Level
  • Approx. 23 hours to complete
  • English Subtitles: English
Read more
Details Icon

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
 at 
Coursera 
Course details

More about this course
  • Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures.
  • Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery.
  • Course Objectives
  • 1. Describe the risk management process
  • 2. Perform security assessment activities
  • 3. Describe processes for operating and maintaining monitoring systems
  • 4. Identify events of interest
  • 5. Describe the various source systems
  • 6. Interpret reporting findings from monitoring results
  • 7. Describe the incident handling process
  • 8. Contribute to the incident handling process based upon role within the organization
  • 9. Describe the supporting role in forensics investigation processes
  • 10. Describe the supporting role in the business continuity planning process
  • 11. Describe the supporting role in the disaster recovery planning process
Read more

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
 at 
Coursera 
Curriculum

Understand the Risk Management Process

Risk Management Process: Risk Visibility and Reporting

Risk Management Process: Creating a Risk Register

Risk Management Process: Risk Register Risk Management Steps

Risk Management Process: Key Terms

Risk Management Process: Key Terms

Risk Management Process: Risk Assessment

Risk Management Process: Preparation Steps

Risk Management Process: Step 2b

Risk Management Process: Quantitative Analysis

Risk Management Process: Qualitative Analysis

Risk Management Process: Step 3

Risk Management Process: Risk Treatment

Risk Management Process: Risk Avoidance

Risk Management Process: Type of Audits

Risk Management Process: Risk Visibility and Reporting

Risk Management Process: Creating a Risk Register

Risk Management Process: Risk Register Risk Management Steps

Risk Management Process: Key Terms

Risk Management Process: Key Terms

Risk Management Process: Risk Assessment

Risk Management Process: Preparation Steps

Risk Management Process: Step 2b

Risk Management Process: Quantitative Analysis

Risk Management Process: Qualitative Analysis

Risk Management Process: Step 3

Risk Management Process: Risk Treatment

Risk Management Process: Risk Avoidance

Risk Management Process: Type of Audits

Quiz 1

Perform Security Assessment Activities

Security Assessment Activities: Participate in Security and Test Results

Security Assessment Activities: Potential Problems

Assessment Activities: Security Gateway Types

Security Assessment Activities: Potential Security Issues

Security Assessment Activities: Penetration Testing

Security Assessment Activities: White Box / Hat

Security Assessment Activities: Reconnaissance

Security Assessment Activities: DNS Zone Transfers

Security Assessment Activities: Network Mapping Techniques

Security Assessment Activities: Firewalking

Security Assessment Activities: Active Penetration

Security Assessment Activities: Participate in Security and Test Results

Security Assessment Activities: Potential Problems

Assessment Activities: Security Gateway Types

Security Assessment Activities: Potential Security Issues

Security Assessment Activities: Penetration Testing

Security Assessment Activities: White Box / Hat

Security Assessment Activities: Reconnaissance

Security Assessment Activities: DNS Zone Transfers

Security Assessment Activities: Network Mapping Techniques

Security Assessment Activities: Firewalking

Security Assessment Activities: Active Penetration

Quiz 2

Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results

Monitoring Systems: Monitoring Terminology

Monitoring Systems: IDS/IPS

Monitoring Systems: Implementation Issues for Monitoring

Maintain Monitoring Systems: Sample Questions

Maintain Monitoring Systems: Attacker Motivations

Maintain Monitoring Systems: Logging

Maintain Monitoring Systems: Log Anomalies

Maintain Monitoring Systems: Log Retention

Monitoring Systems: Compliance

Monitoring Results: Security Baseline

Monitoring Results: SSE-CMM

Monitoring Results: Potential Uses of Server Log Data

Monitoring Systems: Monitoring Terminology

Monitoring Systems: IDS/IPS

Monitoring Systems: Implementation Issues for Monitoring

Maintain Monitoring Systems: Sample Questions

Maintain Monitoring Systems: Attacker Motivations

Maintain Monitoring Systems: Logging

Maintain Monitoring Systems: Log Anomalies

Maintain Monitoring Systems: Log Retention

Monitoring Systems: Compliance

Monitoring Results: Security Baseline

Monitoring Results: SSE-CMM

Monitoring Results: Potential Uses of Server Log Data

Quiz 3

Incident Response and Recovery

Incident Handling: Incident Response

Incident Handling: Preparation

Incident Handling: Training

Incident Handling: Communication Planning

Incident Handling: The Incident Response Team

Incident Handling: IDS and IPS

Incident Handling: Intrusion Detection Techniques

Incident Handling: Anti-Malware Systems

Incident Handling: Packet Sniffers

Incident Handling: SSL Decryption Devices

Incident Handling: Records

Incident Handling: Delaying Containment

Incident Handling: Containment, Eradication, and Recovery

Incident Handling: Incident Response

Incident Handling: Preparation

Incident Handling: Training

Incident Handling: Communication Planning

Incident Handling: The Incident Response Team

Incident Handling: IDS and IPS

Incident Handling: Intrusion Detection Techniques

Incident Handling: Anti-Malware Systems

Incident Handling: Packet Sniffers

Incident Handling: SSL Decryption Devices

Incident Handling: Records

Incident Handling: Delaying Containment

Incident Handling: Containment, Eradication, and Recovery

Quiz 4

Understand and Support Forensic Investigations & Business Continuity and Disaster Recovery Plan

Forensic Investigation: Crime Scene

Forensic Investigation: General Guidelines

Forensic Investigation: Hash Algorithms

BCP and DRP: Emergency Response

BCP and DRP: Comparing BCP and DRP

BCP and DRP: Business Impact Analysis

BCP and DRP: Recovery Time Objective

BCP and DRP: BIA

BCP and DRP: Business Continuity Activity

BCP and DRP: Disaster Recovery Planning

BCP and DRP: Related Documents

BCP and DRP: Multiple Processing Sites

BCP and DRP: Backup and Redundancy Implementation

BCP and DRP: Off-Site Storage

BCP and DRP: RAID Levels

BCP and DRP: RAID Levels

BCP and DRP: Testing and Drills

BCP and DRP: Full Interruption Testing

Forensic Investigation: Crime Scene

Forensic Investigation: General Guidelines

Forensic Investigation: Hash Algorithms

BCP and DRP: Emergency Response

BCP and DRP: Comparing BCP and DRP

BCP and DRP: Business Impact Analysis

BCP and DRP: Recovery Time Objective

BCP and DRP: BIA

BCP and DRP: Business Continuity Activity

BCP and DRP: Disaster Recovery Planning

BCP and DRP: Related Documents

BCP and DRP: Multiple Processing Sites

BCP and DRP: Backup and Redundancy Implementation

BCP and DRP: Off-Site Storage

BCP and DRP: RAID Levels

BCP and DRP: RAID Levels

BCP and DRP: Testing and Drills

BCP and DRP: Full Interruption Testing

Quiz 5

Case Study

Exam

SSCP Exam Information

End-of-Course Exam

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...