Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
- Offered byCoursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery at Coursera Overview
Duration | 23 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 3 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 23 hours to complete
- English Subtitles: English
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery at Coursera Course details
- Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures.
- Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery.
- Course Objectives
- 1. Describe the risk management process
- 2. Perform security assessment activities
- 3. Describe processes for operating and maintaining monitoring systems
- 4. Identify events of interest
- 5. Describe the various source systems
- 6. Interpret reporting findings from monitoring results
- 7. Describe the incident handling process
- 8. Contribute to the incident handling process based upon role within the organization
- 9. Describe the supporting role in forensics investigation processes
- 10. Describe the supporting role in the business continuity planning process
- 11. Describe the supporting role in the disaster recovery planning process
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery at Coursera Curriculum
Understand the Risk Management Process
Risk Management Process: Risk Visibility and Reporting
Risk Management Process: Creating a Risk Register
Risk Management Process: Risk Register Risk Management Steps
Risk Management Process: Key Terms
Risk Management Process: Key Terms
Risk Management Process: Risk Assessment
Risk Management Process: Preparation Steps
Risk Management Process: Step 2b
Risk Management Process: Quantitative Analysis
Risk Management Process: Qualitative Analysis
Risk Management Process: Step 3
Risk Management Process: Risk Treatment
Risk Management Process: Risk Avoidance
Risk Management Process: Type of Audits
Risk Management Process: Risk Visibility and Reporting
Risk Management Process: Creating a Risk Register
Risk Management Process: Risk Register Risk Management Steps
Risk Management Process: Key Terms
Risk Management Process: Key Terms
Risk Management Process: Risk Assessment
Risk Management Process: Preparation Steps
Risk Management Process: Step 2b
Risk Management Process: Quantitative Analysis
Risk Management Process: Qualitative Analysis
Risk Management Process: Step 3
Risk Management Process: Risk Treatment
Risk Management Process: Risk Avoidance
Risk Management Process: Type of Audits
Quiz 1
Perform Security Assessment Activities
Security Assessment Activities: Participate in Security and Test Results
Security Assessment Activities: Potential Problems
Assessment Activities: Security Gateway Types
Security Assessment Activities: Potential Security Issues
Security Assessment Activities: Penetration Testing
Security Assessment Activities: White Box / Hat
Security Assessment Activities: Reconnaissance
Security Assessment Activities: DNS Zone Transfers
Security Assessment Activities: Network Mapping Techniques
Security Assessment Activities: Firewalking
Security Assessment Activities: Active Penetration
Security Assessment Activities: Participate in Security and Test Results
Security Assessment Activities: Potential Problems
Assessment Activities: Security Gateway Types
Security Assessment Activities: Potential Security Issues
Security Assessment Activities: Penetration Testing
Security Assessment Activities: White Box / Hat
Security Assessment Activities: Reconnaissance
Security Assessment Activities: DNS Zone Transfers
Security Assessment Activities: Network Mapping Techniques
Security Assessment Activities: Firewalking
Security Assessment Activities: Active Penetration
Quiz 2
Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results
Monitoring Systems: Monitoring Terminology
Monitoring Systems: IDS/IPS
Monitoring Systems: Implementation Issues for Monitoring
Maintain Monitoring Systems: Sample Questions
Maintain Monitoring Systems: Attacker Motivations
Maintain Monitoring Systems: Logging
Maintain Monitoring Systems: Log Anomalies
Maintain Monitoring Systems: Log Retention
Monitoring Systems: Compliance
Monitoring Results: Security Baseline
Monitoring Results: SSE-CMM
Monitoring Results: Potential Uses of Server Log Data
Monitoring Systems: Monitoring Terminology
Monitoring Systems: IDS/IPS
Monitoring Systems: Implementation Issues for Monitoring
Maintain Monitoring Systems: Sample Questions
Maintain Monitoring Systems: Attacker Motivations
Maintain Monitoring Systems: Logging
Maintain Monitoring Systems: Log Anomalies
Maintain Monitoring Systems: Log Retention
Monitoring Systems: Compliance
Monitoring Results: Security Baseline
Monitoring Results: SSE-CMM
Monitoring Results: Potential Uses of Server Log Data
Quiz 3
Incident Response and Recovery
Incident Handling: Incident Response
Incident Handling: Preparation
Incident Handling: Training
Incident Handling: Communication Planning
Incident Handling: The Incident Response Team
Incident Handling: IDS and IPS
Incident Handling: Intrusion Detection Techniques
Incident Handling: Anti-Malware Systems
Incident Handling: Packet Sniffers
Incident Handling: SSL Decryption Devices
Incident Handling: Records
Incident Handling: Delaying Containment
Incident Handling: Containment, Eradication, and Recovery
Incident Handling: Incident Response
Incident Handling: Preparation
Incident Handling: Training
Incident Handling: Communication Planning
Incident Handling: The Incident Response Team
Incident Handling: IDS and IPS
Incident Handling: Intrusion Detection Techniques
Incident Handling: Anti-Malware Systems
Incident Handling: Packet Sniffers
Incident Handling: SSL Decryption Devices
Incident Handling: Records
Incident Handling: Delaying Containment
Incident Handling: Containment, Eradication, and Recovery
Quiz 4
Understand and Support Forensic Investigations & Business Continuity and Disaster Recovery Plan
Forensic Investigation: Crime Scene
Forensic Investigation: General Guidelines
Forensic Investigation: Hash Algorithms
BCP and DRP: Emergency Response
BCP and DRP: Comparing BCP and DRP
BCP and DRP: Business Impact Analysis
BCP and DRP: Recovery Time Objective
BCP and DRP: BIA
BCP and DRP: Business Continuity Activity
BCP and DRP: Disaster Recovery Planning
BCP and DRP: Related Documents
BCP and DRP: Multiple Processing Sites
BCP and DRP: Backup and Redundancy Implementation
BCP and DRP: Off-Site Storage
BCP and DRP: RAID Levels
BCP and DRP: RAID Levels
BCP and DRP: Testing and Drills
BCP and DRP: Full Interruption Testing
Forensic Investigation: Crime Scene
Forensic Investigation: General Guidelines
Forensic Investigation: Hash Algorithms
BCP and DRP: Emergency Response
BCP and DRP: Comparing BCP and DRP
BCP and DRP: Business Impact Analysis
BCP and DRP: Recovery Time Objective
BCP and DRP: BIA
BCP and DRP: Business Continuity Activity
BCP and DRP: Disaster Recovery Planning
BCP and DRP: Related Documents
BCP and DRP: Multiple Processing Sites
BCP and DRP: Backup and Redundancy Implementation
BCP and DRP: Off-Site Storage
BCP and DRP: RAID Levels
BCP and DRP: RAID Levels
BCP and DRP: Testing and Drills
BCP and DRP: Full Interruption Testing
Quiz 5
Case Study
Exam
SSCP Exam Information
End-of-Course Exam