Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

  • 4.8
Approx. 23 hours to complete

Course Summary

This course is designed to help professionals in IT security and other related fields understand the essential elements of incident response, recovery, and risk management. Students will learn how to effectively manage incidents and mitigate risks, and will also gain an understanding of the legal and regulatory requirements of incident response.

Key Learning Points

  • Learn how to effectively manage incidents and mitigate risks
  • Understand the essential elements of incident response, recovery, and risk management
  • Gain an understanding of the legal and regulatory requirements of incident response

Related Topics for further study


Learning Outcomes

  • Develop a comprehensive understanding of incident response, recovery, and risk management
  • Learn how to effectively manage incidents and mitigate risks in an organization
  • Understand the legal and regulatory requirements of incident response

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of IT security
  • Familiarity with IT risk management

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures
  • Quizzes and assessments

Similar Courses

  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Cybersecurity Fundamentals
  • IT Security: Defense against the digital dark arts

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Eva Galperin

Related Books

Description

Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures.

Outline

  • Understand the Risk Management Process
  • Risk Management Process: Risk Visibility and Reporting
  • Risk Management Process: Creating a Risk Register
  • Risk Management Process: Risk Register Risk Management Steps
  • Risk Management Process: Key Terms
  • Risk Management Process: Key Terms
  • Risk Management Process: Risk Assessment
  • Risk Management Process: Preparation Steps
  • Risk Management Process: Step 2b
  • Risk Management Process: Quantitative Analysis
  • Risk Management Process: Qualitative Analysis
  • Risk Management Process: Step 3
  • Risk Management Process: Risk Treatment
  • Risk Management Process: Risk Avoidance
  • Risk Management Process: Type of Audits
  • Risk Management Process: Risk Visibility and Reporting
  • Risk Management Process: Creating a Risk Register
  • Risk Management Process: Risk Register Risk Management Steps
  • Risk Management Process: Key Terms
  • Risk Management Process: Key Terms
  • Risk Management Process: Risk Assessment
  • Risk Management Process: Preparation Steps
  • Risk Management Process: Step 2b
  • Risk Management Process: Quantitative Analysis
  • Risk Management Process: Qualitative Analysis
  • Risk Management Process: Step 3
  • Risk Management Process: Risk Treatment
  • Risk Management Process: Risk Avoidance
  • Risk Management Process: Type of Audits
  • Quiz 1
  • Perform Security Assessment Activities
  • Security Assessment Activities: Participate in Security and Test Results
  • Security Assessment Activities: Potential Problems
  • Assessment Activities: Security Gateway Types
  • Security Assessment Activities: Potential Security Issues
  • Security Assessment Activities: Penetration Testing
  • Security Assessment Activities: White Box / Hat
  • Security Assessment Activities: Reconnaissance
  • Security Assessment Activities: DNS Zone Transfers
  • Security Assessment Activities: Network Mapping Techniques
  • Security Assessment Activities: Firewalking
  • Security Assessment Activities: Active Penetration
  • Security Assessment Activities: Participate in Security and Test Results
  • Security Assessment Activities: Potential Problems
  • Assessment Activities: Security Gateway Types
  • Security Assessment Activities: Potential Security Issues
  • Security Assessment Activities: Penetration Testing
  • Security Assessment Activities: White Box / Hat
  • Security Assessment Activities: Reconnaissance
  • Security Assessment Activities: DNS Zone Transfers
  • Security Assessment Activities: Network Mapping Techniques
  • Security Assessment Activities: Firewalking
  • Security Assessment Activities: Active Penetration
  • Quiz 2
  • Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results
  • Monitoring Systems: Monitoring Terminology
  • Monitoring Systems: IDS/IPS
  • Monitoring Systems: Implementation Issues for Monitoring
  • Maintain Monitoring Systems: Sample Questions
  • Maintain Monitoring Systems: Attacker Motivations
  • Maintain Monitoring Systems: Logging
  • Maintain Monitoring Systems: Log Anomalies
  • Maintain Monitoring Systems: Log Retention
  • Monitoring Systems: Compliance
  • Monitoring Results: Security Baseline
  • Monitoring Results: SSE-CMM
  • Monitoring Results: Potential Uses of Server Log Data
  • Monitoring Systems: Monitoring Terminology
  • Monitoring Systems: IDS/IPS
  • Monitoring Systems: Implementation Issues for Monitoring
  • Maintain Monitoring Systems: Sample Questions
  • Maintain Monitoring Systems: Attacker Motivations
  • Maintain Monitoring Systems: Logging
  • Maintain Monitoring Systems: Log Anomalies
  • Maintain Monitoring Systems: Log Retention
  • Monitoring Systems: Compliance
  • Monitoring Results: Security Baseline
  • Monitoring Results: SSE-CMM
  • Monitoring Results: Potential Uses of Server Log Data
  • Quiz 3
  • Incident Response and Recovery
  • Incident Handling: Incident Response
  • Incident Handling: Preparation
  • Incident Handling: Training
  • Incident Handling: Communication Planning
  • Incident Handling: The Incident Response Team
  • Incident Handling: IDS and IPS
  • Incident Handling: Intrusion Detection Techniques
  • Incident Handling: Anti-Malware Systems
  • Incident Handling: Packet Sniffers
  • Incident Handling: SSL Decryption Devices
  • Incident Handling: Records
  • Incident Handling: Delaying Containment
  • Incident Handling: Containment, Eradication, and Recovery
  • Incident Handling: Incident Response
  • Incident Handling: Preparation
  • Incident Handling: Training
  • Incident Handling: Communication Planning
  • Incident Handling: The Incident Response Team
  • Incident Handling: IDS and IPS
  • Incident Handling: Intrusion Detection Techniques
  • Incident Handling: Anti-Malware Systems
  • Incident Handling: Packet Sniffers
  • Incident Handling: SSL Decryption Devices
  • Incident Handling: Records
  • Incident Handling: Delaying Containment
  • Incident Handling: Containment, Eradication, and Recovery
  • Quiz 4
  • Understand and Support Forensic Investigations & Business Continuity and Disaster Recovery Plan
  • Forensic Investigation: Crime Scene
  • Forensic Investigation: General Guidelines
  • Forensic Investigation: Hash Algorithms
  • BCP and DRP: Emergency Response
  • BCP and DRP: Comparing BCP and DRP
  • BCP and DRP: Business Impact Analysis
  • BCP and DRP: Recovery Time Objective
  • BCP and DRP: BIA
  • BCP and DRP: Business Continuity Activity
  • BCP and DRP: Disaster Recovery Planning
  • BCP and DRP: Related Documents
  • BCP and DRP: Multiple Processing Sites
  • BCP and DRP: Backup and Redundancy Implementation
  • BCP and DRP: Off-Site Storage
  • BCP and DRP: RAID Levels
  • BCP and DRP: RAID Levels
  • BCP and DRP: Testing and Drills
  • BCP and DRP: Full Interruption Testing
  • Forensic Investigation: Crime Scene
  • Forensic Investigation: General Guidelines
  • Forensic Investigation: Hash Algorithms
  • BCP and DRP: Emergency Response
  • BCP and DRP: Comparing BCP and DRP
  • BCP and DRP: Business Impact Analysis
  • BCP and DRP: Recovery Time Objective
  • BCP and DRP: BIA
  • BCP and DRP: Business Continuity Activity
  • BCP and DRP: Disaster Recovery Planning
  • BCP and DRP: Related Documents
  • BCP and DRP: Multiple Processing Sites
  • BCP and DRP: Backup and Redundancy Implementation
  • BCP and DRP: Off-Site Storage
  • BCP and DRP: RAID Levels
  • BCP and DRP: RAID Levels
  • BCP and DRP: Testing and Drills
  • BCP and DRP: Full Interruption Testing
  • Quiz 5
  • Case Study
  • Exam
  • SSCP Exam Information
  • End-of-Course Exam
English
Available now
Approx. 23 hours to complete
(ISC)² Education & Training
(ISC)²
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses