Planning and Implementing a Security Incident Response

Learn all about planning and implementing a Security Incident Response along with best practices and recommendations

Ratings 4.34 / 5.00
Planning and Implementing a Security Incident Response

What You Will Learn!

  • Manage an enterprise security incident
  • Build a computer security incident response team (CSIRT)
  • Effectively prioritize the response to a security incident
  • Post-incident activity
  • Develop an incident response action plan

Description

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

After completing this course, students will be able to:

  • Effectively prioritize the response to a security incident

  • Build a computer security incident response team (CSIRT)

  • Develop an incident response action plan

  • Post-incident activity

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:

  • Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)

  • Review questions (quizz) at the end of each section

  • Final Exam at the end of the course - review questions to test your knowledge on the topics and concepts learned in the course

  • Links to official Microsoft resources/blogs/videos for further documentation

This course is the 9th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.

Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Who Should Attend!

  • Security Administrators, Security Analysts, System Administrator
  • Any IT enthusiast who wnts to get started in cyber security and be confortable with the Security Incident process

TAKE THIS COURSE

Tags

  • Cyber Security
  • Incident Management

Subscribers

4421

Lectures

9

TAKE THIS COURSE



Related Courses