IT Professional Curricula Internet and Network Technologies Solution Area Security Solutions CompTIA Cybersecurity Analyst+ CS0-001
Assets must be identified before they can be protected. This can come from documentation or IT inventories. Proactive planning streamlines incident response to minimize negative impacts to the organization.
| Objectives |
Threat Management - start the course
- identify assets and related threats
- recognize known, unknown persistent, and zero-day threats
- identify what constitutes PII
- explain payment card data
- identify intellectual property
- control how valuable data is used
- configure group policy to prevent data leakage
- determine the effect of negative incidents
Incident Planning - identify stakeholders related to incident response
- recognize incident response roles
- describe incident disclosure options
Incident Response - analyze host symptoms to determine the best response
- analyze network symptoms to determine the best response
- analyze application symptoms to determine the best response
- contain negative incidents
- thoroughly remove data
- identify positive learned outcomes resulting from incidents
Documentation - identify how OEM documentation can be used to reverse engineering products
- recognize the relevance of up-to-date network documentation
- recognize the ongoing maintenance of incident response plans
- create proper incident forms
- protect the integrity of collected evidence
- implement changes to processes resulting from lessons learned
- determine which type of report provides the best data for a specific situation
- determine if SLA details are aligned with business needs
- explain the purpose of a MOU
- use existing inventory to drive decisions related to security
Practice: Threats and Incident Response - recognize threat impact and design an incident response plan
|