From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Incident detection
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Incident detection
- [Instructor] Once you have an incident response plan in place and a team prepared, the incident response process then enters a state of perpetual monitoring, watching for signs that an incident is occurring or has already taken place. There are many different ways that an organization might identify a security incident. The key to successful incident identification is having a robust security monitoring infrastructure. Data is crucial to incident detection and organizations have a responsibility to collect, analyze, and retain security information. Now, there are many different information sources that may contribute data that's crucial to identifying and analyzing a possible security incident. These include intrusion detection and prevention systems, firewalls, authentication systems, system and file integrity monitoring systems, vulnerability scanners, system event logs, netflow connection records, and anti-malware…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Build an incident response program4m 13s
- (Locked) Creating an incident response team2m 34s
- (Locked) Incident communications plan2m 44s
- (Locked) Incident detection4m 30s
- (Locked) Escalation and notification2m 30s
- (Locked) Mitigation2m 25s
- (Locked) Containment techniques3m
- (Locked) Incident eradication and recovery5m 37s
- (Locked) Validation2m 24s
- (Locked) Post-incident activities4m 16s
- (Locked) Incident response exercises1m 59s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-