Incident Response

Sort options

Technical deep dive with Incident Response tools (Coursera)

Aug 22nd 2022
Technical deep dive with Incident Response tools (Coursera)
Course Auditing
Categories
Effort
Languages
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]

Stages of Incident Response (Coursera)

The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]

Incident Detection and Response (Coursera)

Aug 15th 2022
Incident Detection and Response (Coursera)
Course Auditing
Categories
Effort
Languages
Course 7: Incident Detection and Response. Welcome to course seven, Incident Detection and Response. Having an intruder inside your systems for months unnoticed by your systems, administrators, security specialists, and end-users is tantamount to giving the intruder, the keys to your business or organization. In many cases, organizations discover [...]

Cyber Incident Response (Coursera)

Aug 15th 2022
Cyber Incident Response (Coursera)
Course Auditing
Categories
Effort
Languages
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]

Managing Cybersecurity Incidents and Disasters (Coursera)

Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural [...]