Fundamentals of Cybersecurity Incident Handling
This four-day course is for computer security incident response team (CSIRT) technical staff who have little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work.
The course is designed to provide insight into the work that an incident handler may perform. It will provide an overview of the incident handling arena, including CSIRT services and the nature of incident response activities.
The course incorporates interactive instruction, practical exercises, and role playing.
The course is structured to have 3-day classroom training and 1 full day hands-on practice to reinforce the concepts and techniques discussed in the 3-day training.
In this course, trainees will learn to :
• Gather the information required to handle an incident;
• Realize the importance of having and following pre-defined CSIRT policies and procedures;
• Understand the technical issues relating to commonly reported attack types;
• Perform analysis and response tasks for various sample incidents;
• Apply critical thinking skills in responding to incidents, and
• Identify potential problems to avoid while taking part in CSIRT work.
Delegates must be familiar with Internet services and protocols. It is recommended but not required that delegates have some experience with system administration for Windows or Linux/UNIX systems.
• Module 1: Introduction
- Computer Security Incident Response (CSIR) and Computer Security Incident response Team (CSIRT)
• Module 2: Aligning Information Assurance and Compliance Regulations
• Module 3: Incident Response Policy, Plan and Procedure
• Module 4: CSIRT Services
- Reactive Services
- Proactive Services
- Security Quality Management Services
• Module 5: Responding to Cybersecurity Incidents
- Deploy an Incident Handling and Response Architecture
- Perform Real-Time Incident Handling Tasks
- Prepare for Forensic Investigation
• Hands-On Labs
Download Course Brochure
Information Systems Security Officer (CISSO)
The C)ISSO is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on...
Penetration Testing Engineer (CPTE)
The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning,...
Certified Penetration Testing Consultant (CPTC) - Live Virtual Training
The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against...
Certified Disaster Recovery Engineer (CDRE) - Live Virtual Training
The Certified Disaster Recovery Engineer certification course will prepare individuals to help their business handle the unexpected, while...
Certified Digital Forensics Examiner (CDFE) - Live Virtual Training
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in...
Certified Network Forensics Examiner (CNFE) - Live Virtual Training
The Certified Network Forensics Examiner will take your digital forensic skill set to the next level by navigating through over twenty modules of...
Certified Secure Web Application Engineer (CSWAE) - Live Virtual Training
The Certified Secure Web Application Engineer course is designed to equip students with the knowledge and tools needed to identify and defend...
Certified Incident Handling Engineer (CIHE) - Live Virtual Training
The Certified Incident Handling Engineer course is designed to help incident handlers, system administrators, and general security engineers...
Certified Wireless Security Engineer (CWSE)
The Certified Wireless Security Engineer is prepared to identify those risk that wireless networks present for a business and to create and...
Certified Security Sentinel (CSS)
The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure...
Certified Vulnerability Assessor (CVA)
The Certified Vulnerability Assessor training help students understand the importance of vulnerability assessments.
Certified Security Leadership Officer (CSLO) - Live Virtual Training
The Certified Security Leadership Officer course is designed to give management an essential understanding of current security issues, best...
Certified Professional Ethical Hacker (CPEH) - Live Virtual Training
The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications.
Certified Virtual Machine Engineer (CVME 5.5)
The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an...
Certified Information Security Management Systems - Lead Auditor (CISMS-LA) - Live Virtual Training
The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of...
Certified Information Security Management Systems Lead Implementer (CISMS-LI) - Live Virtual Training
The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through...
Secure Coding Bootcamp
Combination of lecture, security testing and code review. You will learn the most common threats against applications and how to design and code...
Protect Yourself and Your Organization From Cyber Threats (Workshop)
In this series of technology security workshops, we aim to provide critical information and best practices on how to detect & response to the...