Build the expertise to handle real-world cyber incidents. Identify threats, analyze vulnerabilities, and apply structured response procedures to minimize damage and recover quickly from security breaches.
Overview
Syllabus
- Intro to Threats, Vulnerabilities, and Incident Response
- Meet your instructor, discuss what you'll learn in this course, major stakeholders and a brief history, and a peek at the final project!
- Assessing Threats
- This lesson will cover threats and vulnerabilities, attack types, threat motivations, threats to organizations, and threat responses.
- Finding Security Vulnerabilities
- In this lesson, we'll be discussing attack methods, scanning for vulnerabilities, and penetration testing.
- Fixing Security Vulnerabilities
- We're going to cover how to conduct vulnerability research, test and apply results, and how to prioritize and strategize the results in this lesson.
- Preparing for Inevitable Attacks
- Finally, we're going to cover incidents and recovery, events and incidents, the response lifecycle, and roles and response plans.
- Navigating a Cybersecurity Incident
- During the project, you'll summarize and profile a cyber threat, conduct a vulnerability scan, research, analyze and prioritize vulnerabilities, and finally - document incident response actions.
Taught by
Christine Izuakor, PhD, CISSP