5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Incident Response Policy and Governance

Learners can explore the creation, adoption, and use of an IRP (Incident Response Plan) in this 14-video course, which examines the purpose and objectives of an IPR, and how it incorporates the objectives of an organization. You will learn how to draft an IRP, and examine the six stages of incident response: preparation, identification, containment, eradication, recovery, and lessons learned. Next, you will examine several tools that are available for incident response strategies, including Sleuth Kit, Metasploit, Websense, and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams), team roles, their purpose, and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements, and will examine the international standard, ISO 27001. You will examine governance policy to direct and control IT security. Finally, you will learn to use governance polices to create incident response policies, and you will learn the elements and best practices for creating a plan.



Objectives

Policy & Governance: Incident Response

  • discover the key concepts covered in this course
  • describe elements of an incident response policy and how it governs an incident response team
  • describe the incident phases that an incident policy must address and the six stages in an incident response policy
  • describe the tools available in incident response strategies including the three As in incident response and the OODA Loop
  • describe how incident response is managed across various enterprise organizations, providing examples of cases where incident response policies are managed
  • describe how an incident response plan is created and what to include in it, including planning scenarios and recovery objectives
  • describe the concept of a Computer Security Incident Response Team, what a team is compromised of, models and their purpose, and the benefits of outsourcing and having a CSIRT internally
  • recognize what roles to assign to each member of an incident response team and describe how team members would be engaged in various scenarios
  • describe different incidence response scenarios and how an organization should respond with their incident response team
  • describe governance policy, roles and responsibilities, and them purpose of incident response planning
  • describe ISO 27001 and other various compliance standards, as well as how they are applied in incident response
  • use governance policies to effectively create policies in incident response
  • describe best practices and scenarios for establishing an incident response governance policy for several business and information sectors
  • summarize the key concepts covered in this course