Responding to a Breach
With the world’s growing reliance on connected and complex information systems, cyber incidents will continue and may become more common. This interactive, immersive course takes you inside a cybersecurity breach scenario and helps you design your own cybersecurity incident response plan. You will be able to apply a framework and phased approach to various types of cyber incidents and have a chance to experience and think through how different roles (CEO, CISO, COO, etc.) might be involved, how each role might react, and what priorities each of those roles would be weighing during a cyber incident.
- The Phone Rings
- Detection and Analysis
- Investigation, Containment, and Mitigation
- Recovery and Notification
- Post-Incident Review
Who Should Take This Course:
Experienced cyber, information, software and infrastructure security professionals who want to learn how to apply a framework and phased approach for responding to a breach.
About This Course:
Each module begins with an introduction of key concepts based on specific learning objectives, knowledge checks to ensure understanding, and access to relevant resources. Then read relevant thought leadership via articles, blogs and presentations written by industry experts that expand on the concepts covered in the introductory presentation. Each module concludes with an interactive exercise designed to reinforce learning and a final assessment at the end of the last module. You must score 70% or higher on the final assessment prior to receiving a certificate of completion and earning continuing professional education (CPE) credits.