HOME / STAR INCIDENT HANDLER EXPERTS

SIHE - Star Incident Handler Experts


This course will help the attendees to learn the concepts related to the computer security incidents. With this course, you will be able to implement a proper Incident Response Management in your organization and apply appropriate steps to address the various issues related to attacks. Also, you will learn about assessing the risk and mitigating the same by applying proper techniques, policies and laws.After completing this course, attendees Will be able to implement an incident management policies and techniques, and learn to deal With different security issues, They will be able to handle malicious code attacks and mitigates the threats by preparing the reports of the attacks and perform analysis on it to create a proper incident response and recovery system for future.

Audience

Beginner to Intermediate. SIHE assumes that the user is already working in the IT networking field and involved in daily operations and would like to be part of Incident Management Operations.

Course Objectives

In this course, you will learn about:

  • Incident Response System and How to prepare such system in pur organization and understand the threats associated with it.
  • How to implement Incident Response System in your organization to control and prepare the system for defence against attacks.
  • Make recovery plan based on the past attacks and threats.

Course Outcome

After completing this course, you will be able to:

  • Manage the Computer Security Related Incidents and Prepare for future risk mitigation, from malicious code attacks and threats associated.
  • Help the organization built their own IncidentManagementSystemcomprisingofsecure policies and laws.
  • Prepare Recovery plan.

Table of Contents outline

  • What is Incident Response System and why it is Required?
  • Analysing the Risk and Taking Appropriate Actions.
  • Process of Incident Response Management.
  • Setting up Incident Response Management -Team.
  • Identifying and Controlling Network Security incidents.
  • Identifying and Controlling Malicious Code Incidents.
  • Managing Internal Threats.
  • Use of Forensic Analysis in Incident Response.
  • Implementing Policies and Law.
  • Creating incident Reports and Recovery Planning Documents.
  • Case studies.
Quick Inquiry
Data Item 2