Managing Cybersecurity Incidents and Disasters

  • 4.8
Approx. 15 hours to complete

Course Summary

Learn how to manage cybersecurity incidents and disasters with this course. Explore the best practices for handling and responding to security incidents, and gain the skills to develop and implement disaster recovery plans.

Key Learning Points

  • Understand the key principles of incident response and disaster recovery
  • Learn how to identify and analyze security incidents
  • Develop and implement effective disaster recovery plans

Related Topics for further study


Learning Outcomes

  • Develop an effective incident response plan
  • Create a disaster recovery plan that meets industry best practices
  • Identify and analyze security incidents to minimize damage

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of cybersecurity concepts
  • Familiarity with IT infrastructure

Course Difficulty Level

Intermediate

Course Format

  • Online video lectures
  • Quizzes and assignments
  • Peer-reviewed projects

Similar Courses

  • Cybersecurity and Its Ten Domains
  • Introduction to Cybersecurity
  • Cybersecurity Fundamentals

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Mikko Hyppönen

Related Books

Description

Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural and man-made cybersecurity disasters.

Knowledge

  • Define and describe the components of a cybersecurity contingency planning program
  • Identify the components and structure of an effective cybersecurity incident response program
  • Identify the components and structure of an effective cybersecurity disaster recovery program
  • Define and describe recommended contingency strategies including data backup and recovery and continuity of cybersecurity operations

Outline

  • Welcome to Managing Cybersecurity Incidents and Disasters (Course 4)
  • Welcome to Managing Cybersecurity Incidents and Disasters
  • Introduction to Contingency Planning (Module 4.1)
  • Introduction to Contingency Planning
  • What is Contingency Planning?
  • The Contingency Planning Methodology
  • The Business Impact Analysis
  • CP Strategies - Data Backup and Recovery – Part 1
  • CP Strategies - Data Backup and Recovery – Part 2
  • CP Strategies - Real-Time Protection, Server Recovery, and Application Recovery
  • Introduction to Contingency Planning
  • What is Contingency Planning?
  • The Contingency Planning Methodology
  • The Business Impact Analysis
  • CP Strategies - Data Backup and Recovery – Part 2
  • Introduction to Contingency Planning
  • Incident Response (Module 4.2)
  • Incident Response
  • What is Incident Response?
  • Incident Response Planning
  • Incident Response: Detection and Containment
  • Incident Response: Recovery
  • Incident Response
  • Incident Response
  • What is Incident Response?
  • Incident Response Planning
  • Incident Response: Detection and Containment
  • Incident Response: Recovery
  • Wrap-up Quiz for Incident Response
  • Disaster Recovery (Module 4.3)
  • Disaster Recovery
  • Disaster Recovery Planning
  • Disaster Classifications
  • Planning for Disasters
  • Disaster Preparation
  • Disaster Recovery
  • Disaster
  • Disaster Recovery Planning
  • Disaster Classifications
  • Planning for Disasters
  • Disaster Preparation
  • Wrap-up for Disaster Recovery
  • Business Continuity (Module 4.4)
  • Business Continuity
  • Business Continuity Planning
  • Business Continuity Timing and Sequence
  • Crisis Management
  • Business Continuity Wrap up
  • Business Continuity
  • Business Continuity Planning
  • Business Continuity Timing and Sequence
  • Crisis Management
  • Business Continuity
  • Course Wrap Up for Managing Cybersecurity Incidents and Disasters
  • Wrap Up for Managing Cybersecurity Incidents and Disasters
  • Wrap Up Exam for Managing Cybersecurity Incidents and Disasters

Summary of User Reviews

Learn how to manage cybersecurity incidents and disasters with this course from Coursera. Users have praised the course for its comprehensive content and practical approach. Overall, the course has received positive feedback from learners.

Key Aspect Users Liked About This Course

The course's practical approach to managing cybersecurity incidents and disasters was highly praised by many users.

Pros from User Reviews

  • Comprehensive content that covers a wide range of topics related to cybersecurity incidents and disasters
  • Practical approach that focuses on real-world scenarios and provides actionable insights
  • Engaging and interactive course material that keeps learners interested and motivated
  • Experienced instructors with a deep understanding of cybersecurity incidents and disasters
  • Flexible learning options that allow learners to study at their own pace

Cons from User Reviews

  • Some users felt that the course was too technical and required a strong background in cybersecurity
  • Limited opportunities for interaction with instructors and other learners
  • Some users reported technical issues with the course platform
  • The course may not be suitable for beginners or those with limited knowledge of cybersecurity
  • The course may be too basic for experienced cybersecurity professionals
English
Available now
Approx. 15 hours to complete
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP, Michael Whitman, Ph.D., CISM, CISSP
University System of Georgia
Coursera
Share
Saved Course list
Cancel
Get Course Update
Computer Courses