From the course: Complete Guide to Cybersecurity: A Practical Approach
Unlock this course with a free trial
Join today to access over 24,600 courses taught by industry experts.
Learning objectives
From the course: Complete Guide to Cybersecurity: A Practical Approach
Learning objectives
- Welcome to lesson nine, Incident Response Fundamentals. In this lesson, we're going to start by going over how you can get started in incident response. You're also going to understand the incident response process, how to define different playbooks, and how to perform run book automation. You're going to learn about the concepts of cyber threat intelligence, data normalization, and the importance of deconstructing data into universal data formats. You're also going to be learning about the five-tuple correlation and understanding how security monitoring is done in a security operation center. At the end, we're going to survey a lot of different security monitoring tools. Let's get started.
Contents
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Module 2: Incident response, digital forensics, and threat hunting introduction39s
-
(Locked)
Learning objectives54s
-
(Locked)
Exploring how to get started in incident response6m 6s
-
(Locked)
Understanding the incident response process5m 46s
-
(Locked)
Defining playbooks and run book automation (RBA)10m 29s
-
(Locked)
Understanding cyber threat intelligence (CTI)10m 23s
-
(Locked)
Understanding data normalization3m 1s
-
(Locked)
Deconstructing universal data formats and 5-tuple correlation1m 19s
-
(Locked)
Understanding security monitoring fundamentals6m 32s
-
(Locked)
Surveying security monitoring tools13m 33s
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-