Course Overview
Learning Objectives
- Describe the requirements for technical and functional preparation for Incident Response
- Identify attack surfaces to be covered by an Incident Response Plan
- Compare tools and processes used to monitor cyber activities
- Construct a baseline of “normal” cyber traffic
- Interpret data and logs of activity
- Examine network traffic for evidence of anomalies
- Collect evidence of anomalous activity
- Explain the purposes of triage in incident response
- Apply the MITRE ATT&CK matrix to anomalous activity observed
- Construct security event timelines
- Determine if incident escalation is appropriate
- Report actionable data in a timely, clear, concise, and accurate manner
- Apply playbooks in the incident response process
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):