Sale!

Incident Response Course Bootcamp

Original price was: $35.00.Current price is: $10.00.

Price: 10.00 USD | Size: 979 MB |   Duration : 8.05 Hours  | 44 Video Lessons

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Description

Price: 10.00 USD | Size: 979 MB |   Duration : 8.05 Hours  | 44 Video Lessons

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

 

 

 

Incident Response Learning Path

Learn the fundamentals of incident response.

 

About Incident Response

This learning path starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network and host analysis and forensics. This learning path is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process.

 

Course Content :

1. Introduction to Incident Response
1. Flex The Value of Incident Response and Fundamentals
2. Flex The NIST 5 Phases of Incident Response
3. Flex Business Continuity and Disaster Recovery Roles
4. Flex Building an IR Playbook
5. Flex Building an IR Team

2. Stage 1 – Preperation
1. Flex Incident Definitions and Severity Criteria
2. Flex Identifying Threats and Vulnerabilities
3. Flex IR Asset Inventory and Identification

3. Stage 2 – Identification
1. Flex Incident Identification
2. Flex IR Classification Levels
3. Flex CommunicationNotification of an Incident
4. Flex Identification Tools and Techniques

4. Stage 3 – Containment
1. Flex Scoping Containment Efforts
2. Flex Determining Status of InfectedAffected Computing Resources
3. Flex Containment Actions
4. Flex Containment Tools and Techniques

5. Stage 4 – Investigation
1. Flex What Who When Where
2. Flex Investigation Data Sources
3. Flex The Role of Digital Forensics

6. Stage 5 – Eradication
1. Flex What is Eradication
2. Flex Cleanup and Verification
3. Flex Notification
4. Flex Eradication Tools and Techniques

7. Stage 6 – Recovery
1. Flex Returning to Normal Business Processes
2. Flex Service and System Restoration
3. Flex Certification and Validation of Business Continuity
4. Flex Recovery and Restoration Tools and Techniques

8 Stage 7 – Follow Up
1. Flex Assessing the Team and Processes Effectiveness
2. Flex Implementing Improvements
3. Flex Feedback from Other Teams in the Organization

9. Technical Deep Dive with tools of the trade
1. Flex Hands-on Network Forensics Labs Part 1 Zeek connlog 10. Flex Scenario 2 Data BreachHacking Incident Part 2 Containment 2. Flex Hands-on Network Forensics Labs Part 2 Zeek httplog
3. Flex Hands-on Network Forensics Labs Part 3 Zeek dnslog
4. Flex Hands-on Network Forensics Labs Part 4 Putting Them Together
5. Flex Hands-on Network Forensics Labs Part 5 Wireshark Intro
6. Flex Hands-on Network Forensics Labs Part 6 Investigating with Wireshark
7. Flex Hands-on Memory Forensics Labs Part 1 Extracting a Memory Dump
8. Flex Hands-on Memory Forensics Labs Part 2 Extracting Artifacts and IoCs from the Dump with Volatility
9. Flex Scenario 2 Data BreachHacking Incident Part 1 Investigation
11. Flex Scenario 2 Data BreachHacking Incident Part 3 EradicationValidation
12. Flex Scenario 3 Live Ongoing Hacking Incident Part 1 DetectionInvestigation
13. Flex Scenario 3 Live Ongoing Hacking Incident Part 2 InvestigationContainment
14. Flex Scenario 3 Live Ongoing Hacking Incident Part 3 EradicationRecovery


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…