Infosec - Stages of Incident Response
- Offered byCoursera
Stages of Incident Response at Coursera Overview
Duration | 5 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Stages of Incident Response at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 2 of 3 in the Cyber Incident Response Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 5 hours to complete
- English Subtitles: English
Stages of Incident Response at Coursera Course details
- The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects.
- This course starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network, and host analysis and forensics. This course is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process.
Stages of Incident Response at Coursera Curriculum
Stages of Incident Response
Incident definitions and severity criteria
Identifying threats and vulnerabilities
Incident Response assets inventory and identification
Incident Response Stage 1: Preparation
Incident Response: Identification
Incident identification
Incident Response classification levels
Communication/notification of an incident
Identification tools and techniques
Incident Response Stage 2: Identification
Incident Response: Containment
Scoping containment efforts
Determining status of infected/affected computing resources
Containment actions
Containment tools and techniques
Incident Response Stage 3: Containment
Incident Response: Investigation
Who, What, When, Where?
Investigation data sources
The role of Digital Forensics
Incident Response Stage 4: Investigation
Incident Response: Eradication
What is eradication?
Cleanup and verification
Notification
Eradication tools and techniques
Incident Response Stage 5: Eradication
Incident Response: Recovery
Returning to normal business processes
Service and System restoration
Certification and validation of Business Continuity
Recovery and restoration tools and techniques
Incident Response Stage 6: Recovery
Follow Up/Lessons Learned
Assessing the team and processes' effectiveness
Implementing improvements
Feedback from other teams in the organization
Incident Response: Lessons Learned
Understanding Incident Response stages