Join Mike Chapple for an in-depth discussion in this video Next steps, part of CySA+ Cert Prep: 3 Cyber Incident Response.
- [Mike] Thanks for watching…the CySA+ Cyber Incident Response course.…It's been a pleasure joining you for this journey…through the world of incident response…and digital forensics.…I hope that as you've completed this course,…you've found it interesting and helpful…in preparing for the CySA+ exam.…You should now have a solid foundation…for the cyber incident response domain of the exam.…If you're following the CySA+ course series in order,…you've now finished the third domain…and are ready to move on…to Domain 4, Security Architecture and Tool Sets.…
That domain consists of three different courses.…You can now turn to the first one,…CySA+ Security Governance.…Good luck with the rest of your test preparation.…
Author
Released
5/21/2018Want more CySA+ test prep tips? Visit certmike.com to join Mike's free study group.
- Identifying and classifying security incidents
- Determining incident severity
- Building an incident response program
- Notification, mitigation, recording, and reporting
- Incident symptoms
- Conducting forensic investigations
- Password, network, software, and device forensics
Skill Level Intermediate
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Appropriate for all -
IT Security Careers and Certifications: First Steps
with Marc Menninger2h 6m Appropriate for all
-
Introduction
-
Welcome3m 32s
-
-
1. Assessing Incidents
-
Threat classification4m 5s
-
2. Incident Response Process
-
Incident communications plan2m 51s
-
Incident identification4m 2s
-
Escalation and notification2m 42s
-
Mitigation2m 46s
-
Containment techniques3m 21s
-
Validation2m 20s
-
3. Incident Symptoms
-
Network symptoms4m 2s
-
Endpoint symptoms2m 55s
-
Application symptoms2m 20s
-
-
4. Forensic Investigations
-
Evidence types3m 51s
-
System and file forensics4m 17s
-
Creating forensic images5m 36s
-
Digital forensics toolkit3m 13s
-
Password forensics8m 9s
-
Network forensics4m 19s
-
Software forensics3m 32s
-
Mobile device forensics1m 32s
-
Embedded device forensics2m 50s
-
Chain of custody2m 13s
-
Next Steps
-
Next steps43s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Next steps