From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Incident eradication and recovery
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Incident eradication and recovery
- [Instructor] Once you've successfully contained a security incident, you can take a moment to breathe a sigh of relief, but the work of incident response has only just begun. You've managed to contain the damage caused by the incident, but now you must move on to the eradication and recovery stages of the process. Your goal during eradication is to remove any traces of the incident from your systems and networks. If attackers compromised user accounts, you'll need to secure those accounts. If they compromise systems or network devices, you'll need to secure those configurations as well. Basically, you need to go through your network, and remove any traces of the security incident, so that you can be certain that you've effectively secured your organization. The second goal you have during this stage of the process is recovery. This means that you need to restore normal business operations. Now, while the process…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Build an incident response program4m 13s
- (Locked) Creating an incident response team2m 34s
- (Locked) Incident communications plan2m 44s
- (Locked) Incident detection4m 30s
- (Locked) Escalation and notification2m 30s
- (Locked) Mitigation2m 25s
- (Locked) Containment techniques3m
- (Locked) Incident eradication and recovery5m 37s
- (Locked) Validation2m 24s
- (Locked) Post-incident activities4m 16s
- (Locked) Incident response exercises1m 59s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-