Planning and Implementing a Security Incident Response
Learn all about planning and implementing a Security Incident Response along with best practices and recommendations
Description
This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.
After completing this course, students will be able to:
Effectively prioritize the response to a security incident
Build a computer security incident response team (CSIRT)
Develop an incident response action plan
Post-incident activity
This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
Review questions (quizz) at the end of each section
Final Exam at the end of the course - review questions to test your knowledge on the topics and concepts learned in the course
Links to official Microsoft resources/blogs/videos for further documentation
This course is the 9th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
What You Will Learn!
- Manage an enterprise security incident
- Build a computer security incident response team (CSIRT)
- Effectively prioritize the response to a security incident
- Post-incident activity
- Develop an incident response action plan
Who Should Attend!
- Security Administrators, Security Analysts, System Administrator
- Any IT enthusiast who wnts to get started in cyber security and be confortable with the Security Incident process