Understand how to identify and manage an incident. Lisa Bock covers the steps to take after an incident or breach. Explore to the impact of an incident. Move through the process to identify and respond to an incident. Learn possible causes of an incident, to help develop a solution, and resolve and document the problem.
- [Voiceover] An incident is something that disrupts…operational or day-to-day activities…and is generally unplanned.…An incident should not be confused with the disaster…which is large scale and involves multiple agencies…and recovery can take weeks…or worse yet, months.…Although an incident is on a much smaller scale,…it can lead to a disaster if left unchecked.…That is why incident management is an important concept.…
Incident management is responding to a disruption…in information technology services or business processes.…Managing an incident begins as soon as an incident is…reported and continues until operation…has resumed normal activity.…Respond quickly to an incident…to prevent an escalation of a problem.…For example, if there is a bottleneck at a server,…the rest of the network will soon be affected…and in a fear with productivity.…
React and respond before this happens.…Each IT team can generate their own set of procedures…for managing incidents.…However, there are several published guidelines to follow.…
Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. Find more courses in the series on Lisa's author page.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases