Loading...

Course Description

Artistic image of a transparent grey lock with a holographic blue and purple representation of a network

A single piece of personally identifiable information can be worth over $1,000 on the black market, so it’s not a matter of if your company’s data will be breached, it’s when. This course prepares you to plan for and respond to breaches, covering incident response, digital forensics, evidence acquisition and analysis. You will leave with an incident response framework to apply to your organization.

Course Outline

This is an 18-hour course.

  • Incident Response Planning
  • Data Collection, Forensic Duplication, Network-Based Evidence and Evidence Handling
  • Computer Storage Fundamentals, Data Analysis and Network Traffic Analysis
  • Hacking Tools
  • Forensic Reporting

Learner Outcomes

At the end of this course, you will be able to:

  • Understand the type of risks and best practices for preventing these risks
  • Learn how to monitor computer systems for evidence of malicious activity
  • Understand the steps involved in incident response process
  • Learn how to analyze data gathered during an investigation
  • Tailor the incident response framework to your organization

Notes

Learn about more cybersecurity topics here

Recommendations

This course is recommended for defense, military and law enforcement personnel; e-business security professionals; system administrators; and IT managers. Legal, banking, insurance and government professionals can also benefit.

It applies toward the Cybersecurity Essentials certificate.

Applies Towards the Following Certificates

Loading...
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .