• Online, Self-Paced
Course Description

In this course, representing the final section of Module 3: Enterprise Security operations, you will implement incident response and recovery procedures in various scenarios.

Learning Objectives

Conducting Incident Response Methodologies

  • start the course
  • describe e-discovery
  • specify data breach detection, collection, and analytics
  • specify data breach isolation, recovery, and response
  • facilitate incident detection and response
  • describe incident and emergency response
  • describe disaster recovery and order of volatility
  • define incident response support tools
  • specify incident or breach severity
  • describe post-incident response

Practice: Response and Recovery

  • describe incident response and recovery

Framework Connections