Course Outline
Introduction to Incident Handling and Response for Government
- Overview of Information Security Concepts for Government
- Understanding Information Security Threats and Attack Vectors for Government
- Understanding Information Security Incidents for Government
- Overview of Incident Management for Government
- Overview of Vulnerability Management for Government
- Overview of Threat Assessment for Government
- Understanding Risk Management for Government
- Understanding Incident Response Automation and Orchestration for Government
- Incident Handling and Response Best Practices for Government
- Overview of Standards for Government
- Overview of Cybersecurity Frameworks for Government
- Importance of Laws in Incident Handling for Government
- Incident Handling and Legal Compliance for Government
Incident Handling and Response Process for Government
- Overview of Incident Handling and Response (IH&R) Process for Government
- Step 1: Preparation for Incident Handling and Response for Government
- Step 2: Incident Recording and Assignment for Government
- Step 3: Incident Triage for Government
- Step 4: Notification for Government
- Step 5: Containment for Government
- Step 6: Evidence Gathering and Forensics Analysis for Government
- Step 7: Eradication for Government
- Step 8: Recovery for Government
- Step 9: Post-Incident Activities for Government
Forensic Readiness and First Response for Government
- Introduction to Computer Forensics for Government
- Overview of Forensic Readiness for Government
- Overview of First Response for Government
- Overview of Digital Evidence for Government
- Understanding the Principles of Digital Evidence Collection for Government
- Collecting the Evidence for Government
- Securing the Evidence for Government
- Overview of Data Acquisition for Government
- Understanding the Volatile Evidence Collection for Government
- Understanding the Static Evidence Collection for Government
- Performing Evidence Analysis for Government
- Overview of Anti-Forensics for Government
Handling and Response to Malware Incidents for Government
- Overview of Malware Incident Response for Government
- Preparation for Handling Malware Incidents for Government
- Detecting Malware Incidents for Government
- Containment of Malware Incidents for Government
- Eradication of Malware Incidents for Government
- Recovery after Malware Incidents for Government
- Guidelines for Preventing Malware Incidents for Government
Handling and Responding to Email Security Incidents for Government
- Overview of Email Security Incidents for Government
- Preparation for Handling Email Security Incidents for Government
- Detection and Containment of Email Security Incidents for Government
- Eradication of Email Security Incidents for Government
- Recovery after Email Security Incidents for Government
Handling and Responding to Network Security Incidents for Government
- Overview of Network Security Incidents for Government
- Preparation for Handling Network Security Incidents for Government
- Detection and Validation of Network Security Incidents for Government
- Handling Unauthorized Access Incidents for Government
- Handling Inappropriate Usage Incidents for Government
- Handling Denial-of-Service Incidents for Government
- Handling Wireless Network Security Incidents for Government
Handling and Responding to Web Application Security Incidents for Government
- Overview of Web Application Incident Handling for Government
- Web Application Security Threats and Attacks for Government
- Preparation to Handle Web Application Security Incidents for Government
- Detecting and Analyzing Web Application Security Incidents for Government
- Containment of Web Application Security Incidents for Government
- Eradication of Web Application Security Incidents for Government
- Recovery from Web Application Security Incidents for Government
- Best Practices for Securing Web Applications for Government
Handling and Responding to Cloud Security Incidents for Government
- Cloud Computing Concepts for Government
- Overview of Handling Cloud Security Incidents for Government
- Cloud Security Threats and Attacks for Government
- Preparation for Handling Cloud Security Incidents for Government
- Detecting and Analyzing Cloud Security Incidents for Government
- Containment of Cloud Security Incidents for Government
- Eradication of Cloud Security Incidents for Government
- Recovering from Cloud Security Incidents for Government
- Best Practices Against Cloud-based Incidents for Government
Handling and Responding to Insider Threats for Government
- Introduction to Insider Threats for Government
- Preparation for Handling Insider Threats for Government
- Detecting and Analyzing Insider Threats for Government
- Containment of Insider Threats for Government
- Eradication of Insider Threats for Government
- Recovery after Insider Attacks for Government
- Best Practices Against Insider Threats for Government
Requirements
- For government professionals, it is recommended to have a minimum of one year of experience in the cybersecurity field to fully benefit from the course content.
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us