Course Highlights
- This course details the recommended processes and procedures to plan for and use when responding to enterprise security intrusions.
- Effectively prioritize the response to a security incident
- Build a security infrastructure under the NIST Framework
- Build a Computer Security Incident Response Team (CSIRT)
- Develop an incident response action plan
- Post-incident activity
- Co-branded certificate by FutureSkills Prime & SkillUp
- Eligible for GOVT. OF INDIA Incentives
- Job Roles:
- Security Analyst
-
Skill Type
-
Course Duration
-
Domain
-
GOI Incentive applicable
-
Course Category
-
Nasscom Assessment
-
Placement Assistance
-
Certificate Earned
-
Content Alignment Type
-
NOS Details
-
Mode of Delivery
Course Details
What will you learn in Security Incident Response (SKO 0902) course?
After completing this course, one will have sufficient know-how of:
- Building a security infrastructure under the NIST Framework
- Incident Response Policy, Plan, and Procedure Creation
- The security incident report
Why you should take Security Incident Response (SKO 0902) course?
This course will help you to plan for your Security Incident Response, detect threats and learn the best practices.
Who should take Security Incident Response (SKO 0902) course?
This course is designed for those who want to manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of the incident response efforts.
Curriculum
Course 1
- Module 1
- Introduction
- What is threat modelling?
- Key Takeaways from Cyberattacks
- Cyber Threat modeling
- NIST Cybersecurity Framework
- Prepare for a security incident
- Phases of a major response
- Recovery preparations
- Critical success factors
- Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- List for developing a CSIRT
- Team duties
- Team preparations
- Establishing team roles
- CSIRT communications
- Recovering your systems
- Key Takeaways
- Module 3
- The security incident report
- Practice walking through a security incident report
- Next steps
!~mcd_text_data_6~!