This course details the recommended processes and procedures to plan for and use when responding to enterprise security intrusions.
Learning Objectives
Effectively prioritize the response to a security incident
Build a computer security incident response team (CSIRT)
Develop an incident response action plan
List appropriate post-incident activities