Del curso: Complete Guide to Cybersecurity: A Practical Approach
Desbloquea este curso con un periodo de prueba gratis
Únete hoy para acceder a más de 24.900 cursos impartidos por expertos del sector.
Exploring how to get started in incident response
Del curso: Complete Guide to Cybersecurity: A Practical Approach
Exploring how to get started in incident response
- [Instructor] Incident response is a critical aspect of cybersecurity that focuses on managing and mitigating the impact of security incidents. As cyber threats becomes more sophisticated and pervasive, the demand for skilled incident response professionals will continue to grow. This is why I commend you for taking this course and to think about starting a career in incident response. It is an amazing career. I've been doing it for quite some time, and a lot of people start in cybersecurity in incident response. Especially in the technical aspects of cybersecurity, they start in a security operation center as a junior analyst, and then you move up the ranks, you know, going into a senior role in the computer security incident response team or the security operation center, then become a threat hunter. You perform threat hunting and some advanced incident response capabilities, including digital forensics, reverse engineering, and much more. So incident response is a systemic…
Contenido
-
-
-
-
-
-
-
-
-
-
-
(Bloqueado)
Module 2: Incident response, digital forensics, and threat hunting introduction39 s
-
(Bloqueado)
Learning objectives54 s
-
(Bloqueado)
Exploring how to get started in incident response6 min 6 s
-
(Bloqueado)
Understanding the incident response process5 min 46 s
-
(Bloqueado)
Defining playbooks and run book automation (RBA)10 min 29 s
-
(Bloqueado)
Understanding cyber threat intelligence (CTI)10 min 23 s
-
(Bloqueado)
Understanding data normalization3 min 1 s
-
(Bloqueado)
Deconstructing universal data formats and 5-tuple correlation1 min 19 s
-
(Bloqueado)
Understanding security monitoring fundamentals6 min 32 s
-
(Bloqueado)
Surveying security monitoring tools13 min 33 s
-
(Bloqueado)
-
-
-
-
-
-
-
-
-
-
-
-
-
-