01-01 - Course Overview -- Course Overview
02-01 - Preparing for Incident Response and Handling -- Course Introduction
02-02 - Preparing for Incident Response and Handling -- Security Policies and Their Goals
02-03 - Preparing for Incident Response and Handling -- Characteristics and Implementation
02-04 - Preparing for Incident Response and Handling -- Access Control Policy
02-05 - Preparing for Incident Response and Handling -- Acceptable Use Policy
02-06 - Preparing for Incident Response and Handling -- Administrative Security Policy
02-07 - Preparing for Incident Response and Handling -- Asset Control Policy
02-08 - Preparing for Incident Response and Handling -- Audit Trail Policy
02-09 - Preparing for Incident Response and Handling -- Logging Policy
02-10 - Preparing for Incident Response and Handling -- Documentation Policy
02-11 - Preparing for Incident Response and Handling -- Evidence Collection Policy
02-12 - Preparing for Incident Response and Handling -- Evidence Preservation Policy
02-13 - Preparing for Incident Response and Handling -- Information Security Policy
02-14 - Preparing for Incident Response and Handling -- NIACAP, IA, and CA Policy
02-15 - Preparing for Incident Response and Handling -- Physical Security Policy
02-16 - Preparing for Incident Response and Handling -- Physical Security Guidelines
02-17 - Preparing for Incident Response and Handling -- The Law in a Digital World
02-18 - Preparing for Incident Response and Handling -- Summary
03-01 - Incident Response Processes -- What Were Going to Learn
03-02 - Incident Response Processes -- What Is a Computer Security Incident
03-03 - Incident Response Processes -- How Do We Identify an Incident
03-04 - Incident Response Processes -- How Do We Handle an Incident
03-05 - Incident Response Processes -- So Whats the Goal
03-06 - Incident Response Processes -- Whats the Plan
03-07 - Incident Response Processes -- Information Warefare
03-08 - Incident Response Processes -- Vulnerability, Attacks, and Threats
03-09 - Incident Response Processes -- Signs of an Incident
03-10 - Incident Response Processes -- How Do We Respond
03-11 - Incident Response Processes -- The Team
03-12 - Incident Response Processes -- What Did We Learn
04-01 - The Workflow of Incident Response -- Understanding the Workflow
04-02 - The Workflow of Incident Response -- Identification
04-03 - The Workflow of Incident Response -- Incident Recording
04-04 - The Workflow of Incident Response -- Initial Response
04-05 - The Workflow of Incident Response -- Communicating the Incident
04-06 - The Workflow of Incident Response -- Containment
04-07 - The Workflow of Incident Response -- Formulating a Response Strategy
04-08 - The Workflow of Incident Response -- Incident Classification
04-09 - The Workflow of Incident Response -- Incident Investigation
04-10 - The Workflow of Incident Response -- Data Collection
04-11 - The Workflow of Incident Response -- Forensic Analysis
04-12 - The Workflow of Incident Response -- Evidence Protection
04-13 - The Workflow of Incident Response -- Notifying External Agencies
04-14 - The Workflow of Incident Response -- Eradication
04-15 - The Workflow of Incident Response -- System Recovery
04-16 - The Workflow of Incident Response -- Incident Documentation
04-17 - The Workflow of Incident Response -- Incident Damage and Cost Assessment
04-18 - The Workflow of Incident Response -- Review and Update the Response Policies
04-19 - The Workflow of Incident Response -- What Did We Learn
05-01 - Networks and Host Attacks -- What Were Going to Learn
05-02 - Networks and Host Attacks -- Denial of Service Handling
05-03 - Networks and Host Attacks -- Denial of Service Detection
05-04 - Networks and Host Attacks -- Denial of Service Handling
05-05 - Networks and Host Attacks -- Denial of Service Responding
05-06 - Networks and Host Attacks -- Denial of Service Prevention
05-07 - Networks and Host Attacks -- Denial of Service Containment
05-08 - Networks and Host Attacks -- Denial of Service Best Practices
05-09 - Networks and Host Attacks -- Unauthorized Access Handling
05-10 - Networks and Host Attacks -- Unauthorized Access Signs of a Root Compromise
05-11 - Networks and Host Attacks -- Unauthorized Access Hardware
05-12 - Networks and Host Attacks -- Unauthorized Access Responding
05-13 - Networks and Host Attacks -- Unauthorized Access Prevention
05-14 - Networks and Host Attacks -- Unauthorized Access Responding
05-15 - Networks and Host Attacks -- Unauthorized Access Eradicate and Recovery
05-16 - Networks and Host Attacks -- Unauthorized Access Best Practices
05-17 - Networks and Host Attacks -- Inappropriate Usage Detecting
05-18 - Networks and Host Attacks -- Inappropriate Usage Prevention
05-19 - Networks and Host Attacks -- Inappropriate Usage Containment
05-20 - Networks and Host Attacks -- Multiple Components Issues Handling
05-21 - Networks and Host Attacks -- Multiple Components Issues Responding
05-22 - Networks and Host Attacks -- What Did We Learn
06-01 - Service and Application Attacks -- What Were Going to Learn
06-02 - Service and Application Attacks -- Service and Application Monitoring
06-03 - Service and Application Attacks -- Some Symptoms Services
06-04 - Service and Application Attacks -- Demo Checking Services
06-05 - Service and Application Attacks -- Demo Application Error Monitoring
06-06 - Service and Application Attacks -- Analysis Applications
06-07 - Service and Application Attacks -- Service and Application Response and Restore
06-08 - Service and Application Attacks -- Detecting the Attacks Applications
06-09 - Service and Application Attacks -- Types of Attacks Session Hijacking
06-10 - Service and Application Attacks -- Demo Session Hijack
06-11 - Service and Application Attacks -- Symptoms Session Hijacking
06-12 - Service and Application Attacks -- Defense Session Hijacking
06-13 - Service and Application Attacks -- When It Happens Session Hijacking
06-14 - Service and Application Attacks -- Types of Attacks Command Injection
06-15 - Service and Application Attacks -- Defense SQL Injections
06-16 - Service and Application Attacks -- When It Happens SQL Injection
06-17 - Service and Application Attacks -- Types of Attacks XSS Attacks
06-18 - Service and Application Attacks -- What Attackers Are Looking For XSS Attacks
06-19 - Service and Application Attacks -- Types of XSS Attacks
06-20 - Service and Application Attacks -- Tools XSS Attacks
06-21 - Service and Application Attacks -- Defense XSS Attacks
06-22 - Service and Application Attacks -- When It Happens XSS Attacks
06-23 - Service and Application Attacks -- Types of Attacks Buffer Overflow
06-24 - Service and Application Attacks -- Types of Buffer Overflows
06-25 - Service and Application Attacks -- Tools Buffer Overflows
06-26 - Service and Application Attacks -- Defense Buffer Overflows
06-27 - Service and Application Attacks -- When It Happens Buffer Overflows
06-28 - Service and Application Attacks -- What Did We Learn
07-01 - Malicious Code and Insider Threats -- What Were Going to Learn
07-02 - Malicious Code and Insider Threats -- Malicious Code Virus and Worms
07-03 - Malicious Code and Insider Threats -- Malicious Code Trojans and Spyware
07-04 - Malicious Code and Insider Threats -- Malicious Code What to Do
07-05 - Malicious Code and Insider Threats -- Malicious Code What Are the Signs
07-06 - Malicious Code and Insider Threats -- Malicious Code Containment
07-07 - Malicious Code and Insider Threats -- Malicious Code Gather Evidence
07-08 - Malicious Code and Insider Threats -- Malicious Code Bots and Botnets
07-09 - Malicious Code and Insider Threats -- Malicious Code How Bots and Botnets Work
07-10 - Malicious Code and Insider Threats -- Incident Response Handling Performing
07-11 - Malicious Code and Insider Threats -- Malicious Code Rootkits in Windows
07-12 - Malicious Code and Insider Threats -- Malicious Code Rootkits - Kernel Mode
07-13 - Malicious Code and Insider Threats -- When It Happens Rootkits
07-14 - Malicious Code and Insider Threats -- Prevention Rootkits
07-15 - Malicious Code and Insider Threats -- Insider Threats The Landscape
07-16 - Malicious Code and Insider Threats -- Insider Threats The Workflow
07-17 - Malicious Code and Insider Threats -- Insider Threats Detection and Response
07-18 - Malicious Code and Insider Threats -- Insider Threats Prevention - Network Level
07-19 - Malicious Code and Insider Threats -- Insider Threats Prevention - Access Control
07-20 - Malicious Code and Insider Threats -- Insider Threats Prevention - Awareness Program
07-21 - Malicious Code and Insider Threats -- Insider Threats Prevention - Admins and Privileged Users
07-22 - Malicious Code and Insider Threats -- Insider Threats Prevention - Backups
07-23 - Malicious Code and Insider Threats -- What Did We Learn