Author
Released
12/9/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Skill Level Beginner
Duration
Views
- [Mike] No matter how hard we try to prevent them, sometimes things go wrong in the world of information security. We spend a lot of time analyzing risks and implementing security controls, but those controls aren't foolproof. Information security analysts must be prepared to handle security incidents that arise in their organizations in a manner that contains the damage, determines the root cause, resolves the issue, and then recovers normal operations as quickly as possible. Hi, I'm Mike Chapple, and I'd like to invite you to watch my course on Security Operations and Incident Response. It's part of a 10-course series preparing you for the Security+ exam. I hope that you'll join me as we explore the world of incident response, investigations and forensics.
Related Courses
-
Transitioning to a Career in Cybersecurity
with Marc Menninger1h 10m Intermediate -
Learning Vulnerability Management
with Lora Vaughn53m 54s Beginner -
Cybersecurity Foundations
with Malcolm Shore1h 59m Intermediate
-
Introduction
-
Study resources1m 40s
-
1. Incident Response Programs
-
Incident communications plan2m 42s
-
Incident identification4m 26s
-
Escalation and notification2m 29s
-
Mitigation2m 22s
-
Validation2m 24s
-
Post-incident activities3m 50s
-
Incident response exercises1m 37s
-
2. Attack Frameworks
-
MITRE ATT&CK2m 25s
-
Cyber kill chain analysis1m 49s
-
-
3. Incident Investigation
-
Logging security information5m 30s
-
-
4. Forensic Techniques
-
Conducting investigations3m 50s
-
Evidence types3m 28s
-
Introduction to forensics3m 21s
-
System and file forensics4m 26s
-
File carving3m 46s
-
Creating forensic images5m 30s
-
Digital forensics toolkit2m 25s
-
Password forensics7m 16s
-
Network forensics4m 1s
-
Software forensics4m 25s
-
Mobile device forensics1m 10s
-
Embedded device forensics2m 30s
-
Chain of custody1m 51s
-
Exploitation frameworks6m 4s
-
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Operations and incident response