• Online, Self-Paced
Course Description

In this course, representing the final section of Module 3: Enterprise Security operations, you will implement incident response and recovery procedures in various scenarios.

Learning Objectives

Conducting Incident Response Methodologies

  • start the course
  • describe e-discovery
  • specify data breach detection, collection, and analytics
  • specify data breach isolation, recovery, and response
  • facilitate incident detection and response
  • describe incident and emergency response
  • describe disaster recovery and order of volatility
  • define incident response support tools
  • specify incident or breach severity
  • describe post-incident response

Practice: Response and Recovery

  • describe incident response and recovery

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Exploitation Analysis
  • Risk Management
  • Systems Analysis
  • Vulnerability Assessment and Management

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.