01.01-incident management
01.02-what you need to know
01.03-study resources
02.01-role of a manager in incident response
02.02-creating an incident response team
03.01-identifying and classifying security incidents
03.02-threat classification
03.03-zero days and the advanced persistent threat
03.04-determining incident severity
04.01-build an incident response program
04.02-incident communications plan
04.03-incident identification
04.04-escalation and notification
04.05-mitigation
04.06-containment techniques
04.07-incident eradication and recovery
04.08-validation
04.09-post-incident activities
04.10-incident response exercises
05.01-network symptoms
05.02-rogue access points and evil twins
05.03-endpoint symptoms
05.04-application symptoms
06.01-conducting investigations
06.02-evidence types
06.03-introduction to forensics
06.04-system and file forensics
06.05-file carving
06.06-creating forensic images
06.07-digital forensics toolkit
06.08-operating system analysis
06.09-password forensics
06.10-network forensics
06.11-software forensics
06.12-mobile device forensics
06.13-embedded device forensics
06.14-chain of custody
06.15-ediscovery and evidence production
06.16-exploitation frameworks
07.01-security information and event management
07.02-continuous security monitoring
08.01-continuing your studies