Course Objectives
In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will:
- Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements.
Agenda
- The Importance of Risk Management
- Integrating Documentation into Risk Management
- Deployment of Incident Handling and Response Architecture
- Containment and Mitigation of Incidents
- Preparation for Forensic Investigation as a CSIRT
- Use a Forensic Investigation Plan
- Securely Collect and Analyze Electronic Evidence
- Follow Up on the Results of an Investigation
- Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections
- Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it – this could be discussion-based activity as well.)
- Search terms to find state legislation
- Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous.
- Provide answers on when to use federal versus state and do you have to follow both?
FREE
Interested in course?
Course Type: Instructor Led