MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 453 MB | Duration: 1h 58m
Learn all about planning and implementing a Security Incident Response along with best practices and recommendations
What you'll learn
Manage an enterprise security incident
Build a computer security incident response team (CSIRT)
Effectively prioritize the response to a security incident
Post-incident activity
Develop an incident response action plan
Requirements
Basic understanding of the current cybersecurity ecosystem
Basic understanding of analysis of hacks on computers and networks
Basic understanding of Risk Management
Description
This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.
After completing this course, students will be able to:
Effectively prioritize the response to a security incident
Build a computer security incident response team (CSIRT)
Develop an incident response action plan
Post-incident activity
This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
Review questions (quizz) at the end of each section
Final Exam at the end of the course - review questions to test your knowledge on the topics and concepts learned in the course
Links to official Microsoft resources/blogs/videos for further documentation
This course is the 9th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
Who this course is for:
Security Administrators, Security Analysts, System Administrator
Any IT enthusiast who wnts to get started in cyber security and be confortable with the Security Incident process
DOWNLOAD
uploadgig.com
rapidgator.net
nitro.download