Course HighlightsCOURSE
Information Security Audits

Information Security Audits

This course details the recommended processes and procedures to audit existing security process and procedures to prevent catastrophic security breaches.

Information Security Audits Highlights

Course Enrollment

Starts on

06 July 2020

Enrollment closes on
31 December 2022

  Course duration

Duration

  • 5 Hours
  Course Fee

Fee

US$ 49 - US$ 99

Course Enrollment

Starts on

06 July 2020

Enrollment closes on
31 December 2022

Course duration

Duration

  • 5 Hours
Course Fee

Fee

US$ 49 - US$ 99

About this course

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

What you'll learn

After completing this course, students will be able to:

  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • List appropriate post-incident activities

Prerequisites

  • A understanding of the current cybersecurity ecosystem.

Course Syllabus

Module 1

  • Introduction
  • What is threat modelling?
  • The need for incident response plans
  • Assess vulnerabilities in your environment
  • Establish routine monitoring and review of network traffic and system performance
  • Log analysis

Module 2

  • Incident Response Policy, Plan, and Procedure Creation
  • Creation of a CSIRT
  • Establish CSIRT team roles
  • Establish governing policy

Module 3

  • Initial assessment of incident
  • Attack vectors
  • What are false positives and false negatives?
  • Determine the nature of the attack
  • Identify the systems that have been compromised
  • Choosing a containment strategy

Module 4

  • Post-incident activity
  • Protect the evidence while restoring functionality
  • Recommendations and Lessons learned
  • Security incident report

Course Outline

Introduction
Cyber Threat Modeling
Stride
The National Institute for Standards and Technology (NIST) Cybersecurity Framework (CSF)
Identify
Protect
Detect
Respond
Incident Response
Prepare
Things to Remember while in an Incident
Recovery Preparations
Lesson Review - Hallmarks of a Strong Response Program
Critical Success Factors
Module 1
Preparation Actions
Team Duties
Team Preparations
Establishing Team Roles
CSIRT Communications
Recovering
Reviewing Response and Updating Policies
Module Summary
Module 2
The Security Incident Report
Introduction
Practice-SIR
Incident-Overview
Disaster Recovery Plan
Assessment Questions
Course Final
Course Certificate

Earn your certificate

Once you have completed this course, you will earn your certificate.

Information Security Audits