Course Outline
Introduction to Incident Handling
- Understanding cybersecurity incidents
- Goals and benefits of incident handling
- Incident response standards and frameworks (NIST, ISO, etc.)
Incident Response Process
- Preparation and planning
- Detection and analysis
- Classification and prioritization
Containment Strategies
- Short-term vs long-term containment
- Network segmentation and isolation techniques
- Coordination with stakeholders and notification protocols
Eradication and Recovery
- Identifying root causes
- System restoration and patching
- Monitoring post-recovery
Documentation and Reporting
- Incident documentation best practices
- Generating actionable post-mortem reports
- Lessons learned and metrics for improvement
Incident Response Tools and Technologies
- SIEM systems and log analysis tools
- Endpoint detection and response (EDR)
- Automation and orchestration in IR
Tabletop Exercises and Simulations
- Interactive incident scenarios
- Team coordination drills
- Evaluating response effectiveness
Summary and Next Steps
Requirements
- Basic understanding of IT security concepts
- Familiarity with network protocols and system administration
- Awareness of cybersecurity threats and vulnerabilities
Audience
- IT security analysts
- Incident response team members
- Cybersecurity operations professionals
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from £5700 online delivery, based on a group of 2 delegates, £1800 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent