وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003): 3 Incident Response and Management

سرفصل های دوره

Cybersecurity professionals are responsible for responding to security incidents and carrying out other operational tasks. The CompTIA Cybersecurity Analyst+ (CySA+_ (CS0-003) exam can offer valuable training and certification of your skills. In this course, Mike Chapple dives into incident response practices, as needed to complete the CySA+ exam. Learn about classifying threats and assessing the impact of cybersecurity incidents. Go over the importance of communication during a cybersecurity incident response effort, as well as the symptoms of an incident in progress, the use of forensic tools, and the incident recovery process. After completing this course, you will be prepared to answer questions on the CySA+ exam from the Incident Response and Management domain.


01 - Introduction
  • 01 - Incident response
  • 02 - What you need to know
  • 03 - Study resources

  • 02 - 1. Incident Response Programs
  • 01 - Build an incident response program
  • 02 - Creating an incident response team
  • 03 - Incident communications plan
  • 04 - Incident identification
  • 05 - Escalation and notification
  • 06 - Mitigation
  • 07 - Containment techniques
  • 08 - Incident eradication and recovery
  • 09 - Validation
  • 10 - Post-incident activities
  • 11 - Incident response exercises

  • 03 - 2. Attack Frameworks
  • 01 - MITRE ATT&CK
  • 02 - Diamond model of intrusion analysis
  • 03 - Cyber kill chain analysis
  • 04 - Testing guides

  • 04 - 3. Incident Investigation
  • 01 - Logging security information
  • 02 - Security information and event management
  • 03 - Cloud audits and investigations

  • 05 - 4. Forensic Techniques
  • 01 - Conducting investigations
  • 02 - Evidence types
  • 03 - Introduction to forensics
  • 04 - System and file forensics
  • 05 - File carving
  • 06 - Creating forensic images
  • 07 - Digital forensics toolkit
  • 08 - Operating system analysis
  • 09 - Password forensics
  • 10 - Network forensics
  • 11 - Software forensics
  • 12 - Mobile device forensics
  • 13 - Embedded device forensics
  • 14 - Chain of custody
  • 15 - Ediscovery and evidence production

  • 06 - 5. Business Continuity
  • 01 - Business continuity planning
  • 02 - Business continuity controls
  • 03 - High availability and fault tolerance

  • 07 - 6. Disaster Recovery
  • 01 - Disaster recovery
  • 02 - Backups
  • 03 - Restoring backups
  • 04 - Disaster recovery sites
  • 05 - Testing BCDR plans
  • 06 - After-action reports

  • 08 - Conclusion
  • 01 - Continuing your studies
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 18869
    حجم: 332 مگابایت
    مدت زمان: 151 دقیقه
    تاریخ انتشار: 20 شهریور 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید