Implementing Incident Response & Recovery

placeholder

Incident response and recovery procedures are essential to enterprise security operations. In this course you will learn about e-discovery data breach detection collection and analytics data breach isolation recovery and response. Other topics include incident detection and response disaster recovery and order of volatility incident response support tools and post-incident response. Finally as a scenario exercise you will name the three phases of e-discovery list the eight phases of EDRM list the seven orders of volatility and name three components to make hashed images in a forensic investigation.