Policy & Governance: Incident Response

placeholder

Learners can explore the creation adoption and use of an IRP (Incident Response Plan) in this 14-video course which examines the purpose and objectives of an IPR and how it incorporates the objectives of an organization. You will learn how to draft an IRP and examine the six stages of incident response: preparation identification containment eradication recovery and lessons learned. Next you will examine several tools that are available for incident response strategies including Sleuth Kit Metasploit Websense and FireEye Security Orchestrator. You will explore the different types of CSIRTs (Computer Security Incident Response Teams) team roles their purpose and the benefits of an outsourced team. This course demonstrates an incident team response with two hypothetical scenarios. You will learn about compliance and regulatory requirements and will examine the international standard ISO 27001. You will examine governance policy to direct and control IT security. Finally you will learn to use governance polices to create incident response policies and you will learn the elements and best practices for creating a plan.