In this course, representing the final section of Module 3: Enterprise Security operations, you will implement incident response and recovery procedures in various scenarios.
Learning Objectives
Conducting Incident Response Methodologies
- start the course
- describe e-discovery
- specify data breach detection, collection, and analytics
- specify data breach isolation, recovery, and response
- facilitate incident detection and response
- describe incident and emergency response
- describe disaster recovery and order of volatility
- define incident response support tools
- specify incident or breach severity
- describe post-incident response
Practice: Response and Recovery
- describe incident response and recovery
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Cyber Defense Infrastructure Support
- Cybersecurity Management
- Executive Cyber Leadership
- Exploitation Analysis
- Risk Management
- Systems Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.