In this course, representing the final section of Module 3: Enterprise Security operations, you will implement incident response and recovery procedures in various scenarios.
Learning Objectives
Conducting Incident Response Methodologies
- start the course
- describe e-discovery
- specify data breach detection, collection, and analytics
- specify data breach isolation, recovery, and response
- facilitate incident detection and response
- describe incident and emergency response
- describe disaster recovery and order of volatility
- define incident response support tools
- specify incident or breach severity
- describe post-incident response
Practice: Response and Recovery
- describe incident response and recovery