Price:
$2,995.00
Days:
1
Virtual
– • Understand the key issues plaguing the information security world
– • Learn to combat different types of cybersecurity threats, attack vectors, threat actors, and their motives
– • Learn the fundamentals of incident management, including the signs and costs of an incident
– • Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
– • Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
– • Decode the various steps involved in planning an incident handling and response program
– • Gain an understanding of the fundamentals of computer forensics and forensic readiness
– • Comprehend the importance of the first response procedure, including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
– • Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
• Candidates with a minimum of 1 year of work experience in the domain.
• Introduction to Incident Handling and Response
• Introduction to Incident Handling and Response
• Introduction to Incident Handling and Response
• Introduction to Incident Handling and Response
• Introduction to Incident Handling and Response
• Incident Handling and Response Process
• Incident Handling and Response Process
• Incident Handling and Response Process
• Incident Handling and Response Process
• Incident Handling and Response Process
• Forensic Readiness and First Response
• Forensic Readiness and First Response
• Forensic Readiness and First Response
• Forensic Readiness and First Response
• Forensic Readiness and First Response
• Handling and Responding to Malware Incidents
• Handling and Responding to Malware Incidents
• Handling and Responding to Malware Incidents
• Handling and Responding to Malware Incidents
• Handling and Responding to Malware Incidents
• Handling and Responding to Cloud Security Incidents
• Handling and Responding to Cloud Security Incidents
• Handling and Responding to Cloud Security Incidents
• Handling and Responding to Cloud Security Incidents
• Handling and Responding to Cloud Security Incidents
• Handling and Responding to Web Application Security Incidents
• Handling and Responding to Web Application Security Incidents
• Handling and Responding to Web Application Security Incidents
• Handling and Responding to Web Application Security Incidents
• Handling and Responding to Web Application Security Incidents
• Handling and Responding to Insider Threats
• Handling and Responding to Insider Threats
• Handling and Responding to Insider Threats
• Handling and Responding to Insider Threats
• Handling and Responding to Insider Threats
• Handling and Responding to Email Security Incidents
• Handling and Responding to Email Security Incidents
• Handling and Responding to Email Security Incidents
• Handling and Responding to Email Security Incidents
• Handling and Responding to Email Security Incidents
• Handling and Responding to Network Security Incidents
• Handling and Responding to Network Security Incidents
• Handling and Responding to Network Security Incidents
• Handling and Responding to Network Security Incidents
• Handling and Responding to Network Security Incidents
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.