Course Outline
Introduction to Incident Handling and Response for Government
- Overview of Information Security Concepts
- Understanding Information Security Threats and Attack Vectors
- Comprehending Information Security Incidents
- Overview of Incident Management for Government
- Overview of Vulnerability Management for Government
- Overview of Threat Assessment for Government
- Understanding Risk Management for Government
- Incident Response Automation and Orchestration for Government
- Best Practices in Incident Handling and Response for Government
- Overview of Standards Relevant to Government Operations
- Overview of Cybersecurity Frameworks for Government
- The Importance of Laws in Incident Handling for Government
- Incident Handling and Legal Compliance for Government
Incident Handling and Response Process for Government
- Overview of the Incident Handling and Response (IH&R) Process for Government
- Step 1: Preparation for Incident Handling and Response in Government
- Step 2: Incident Recording and Assignment for Government
- Step 3: Incident Triage for Government
- Step 4: Notification for Government
- Step 5: Containment for Government
- Step 6: Evidence Gathering and Forensics Analysis for Government
- Step 7: Eradication for Government
- Step 8: Recovery for Government
- Step 9: Post-Incident Activities for Government
Forensic Readiness and First Response for Government
- Introduction to Computer Forensics for Government
- Overview of Forensic Readiness for Government
- Overview of First Response for Government
- Overview of Digital Evidence for Government
- Understanding the Principles of Digital Evidence Collection for Government
- Collecting the Evidence for Government
- Securing the Evidence for Government
- Overview of Data Acquisition for Government
- Understanding Volatile Evidence Collection for Government
- Understanding Static Evidence Collection for Government
- Performing Evidence Analysis for Government
- Overview of Anti-Forensics for Government
Handling and Response to Malware Incidents for Government
- Overview of Malware Incident Response for Government
- Preparation for Handling Malware Incidents in Government
- Detecting Malware Incidents for Government
- Containment of Malware Incidents for Government
- Eradication of Malware Incidents for Government
- Recovery after Malware Incidents for Government
- Guidelines for Preventing Malware Incidents in Government
Handling and Responding to Email Security Incidents for Government
- Overview of Email Security Incidents for Government
- Preparation for Handling Email Security Incidents in Government
- Detection and Containment of Email Security Incidents for Government
- Eradication of Email Security Incidents for Government
- Recovery after Email Security Incidents for Government
Handling and Responding to Network Security Incidents for Government
- Overview of Network Security Incidents for Government
- Preparation for Handling Network Security Incidents in Government
- Detection and Validation of Network Security Incidents for Government
- Handling Unauthorized Access Incidents for Government
- Handling Inappropriate Usage Incidents for Government
- Handling Denial-of-Service Incidents for Government
- Handling Wireless Network Security Incidents for Government
Handling and Responding to Web Application Security Incidents for Government
- Overview of Web Application Incident Handling for Government
- Web Application Security Threats and Attacks for Government
- Preparation to Handle Web Application Security Incidents in Government
- Detecting and Analyzing Web Application Security Incidents for Government
- Containment of Web Application Security Incidents for Government
- Eradication of Web Application Security Incidents for Government
- Recovery from Web Application Security Incidents for Government
- Best Practices for Securing Web Applications in Government
Handling and Responding to Cloud Security Incidents for Government
- Cloud Computing Concepts for Government
- Overview of Handling Cloud Security Incidents for Government
- Cloud Security Threats and Attacks for Government
- Preparation for Handling Cloud Security Incidents in Government
- Detecting and Analyzing Cloud Security Incidents for Government
- Containment of Cloud Security Incidents for Government
- Eradication of Cloud Security Incidents for Government
- Recovering from Cloud Security Incidents for Government
- Best Practices Against Cloud-Based Incidents in Government
Handling and Responding to Insider Threats for Government
- Introduction to Insider Threats for Government
- Preparation for Handling Insider Threats in Government
- Detecting and Analyzing Insider Threats for Government
- Containment of Insider Threats for Government
- Eradication of Insider Threats for Government
- Recovery after Insider Attacks for Government
- Best Practices Against Insider Threats in Government
Requirements
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us