Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Incident Handling and Response
Intoduction
1. Introduction (6:56)
Preparation
2. Preparation of People and Policy (7:33)
3. Team building and Managing (6:27)
Identification
4. Where Does Identification Occur (6:28)
5. What to Check (7:05)
Containment
6. Deployment and Categorization (4:47)
7. Short-term and Long-term Actions (5:26)
Eradication
8. Restore and Improving Defenses (4:50)
Recovery
9. Validation and Monitoring (5:43)
Lessons Learned
10. Meet, Fix, and Share (5:29)
Teach online with
4. Where Does Identification Occur
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock