Deploying a Cyber Battle Team
This course teaches you what to do in the case of a cyber-attack. It covers all the steps of the process, from deploying your team at the right time, collecting and disseminating information to working with law enforcement to ensure the threats are remediated and your enterprise wins the battle against cyber criminals.
You will learn how to gather the information required to handle an incident; realise the importance of having and following pre-defined CSIRT policies and procedures; understand the technical issues relating to commonly reported attack types; perform analysis and response tasks for various sample incidents; apply critical thinking skills in responding to incidents, and identify potential problems to avoid while taking part in CSIRT work. you will identify policies and procedures that should be established and implemented when creating a CSIRT.
Most small business owners are unaware of the exact protocols they should follow in case their enterprise is hit by a breach or a cyber attack. This course solves that problem, laying out a roadmap of what, how, and when to take certain actions to ensure threat remediation and recovery.