Deprecated: Hook jetpack_pre_connection_prompt_helpers is deprecated since version jetpack-13.2.0 with no alternative available. in /home/weckwu3zszis/public_html/wp-includes/functions.php on line 6078
IRBIZ – Trainstem Computer Training Center in Doha, Qatar

IRBIZ

IRBIZ course will guide business, IT and non-technical leaders through industry incident response methods and procedures frameworks, and also teach best practices and mitigation methods.

Overview

This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation.

Course Objectives:

In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform.

You will:

  • Explain the importance of best practices in preparation for incident response
  • Given a scenario, execute the incident response process
  • Explain general mitigation methods and devices
  • Assess and comply with current incident response requirements.

Target Student:

This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response and incident handling process requirements.

Course Content 

Lesson 1: Assessment of Information Security Risks  

Lesson 2: Response to Cybersecurity Incidents  

Lesson 3: Investigating Cybersecurity Incidents  

Lesson 4: Complying with Legislation

Course Info
×