From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Containment techniques
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Containment techniques
- [Narrator] The first minutes and hours of a cybersecurity incident are an incredibly stressful time. You've conducted some initial analysis and you've determined that an incident is taking place, and you know that there is an intruder active in your network. You've been compromised and the next steps that you take will play a significant role in the outcome of the incident. In the NIST incident handling process you've moved from the detection and analysis phase into the containment, eradication and recovery phase. If you've done your work well in the preparation phase this is where it all pays off. The biggest difference between the earlier phases and this phase is that you've shifted from the passive activities of detection and analysis into an active phase where you're taking actions in response to the incident. Now as we've discussed, your first priority should be containing the damage caused by the incident. You want…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Build an incident response program4m 13s
- (Locked) Creating an incident response team2m 34s
- (Locked) Incident communications plan2m 44s
- (Locked) Incident detection4m 30s
- (Locked) Escalation and notification2m 30s
- (Locked) Mitigation2m 25s
- (Locked) Containment techniques3m
- (Locked) Incident eradication and recovery5m 37s
- (Locked) Validation2m 24s
- (Locked) Post-incident activities4m 16s
- (Locked) Incident response exercises1m 59s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-