incident response

  1. Incident Response and Advanced Forensics Cybrary

    In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery. Hidden content
  2. Computer Incident Response | Infosec

    Active Directory with Windows Server 2016 training This learning path teaches you all about managing identities in Active Directory. As you progress through five courses, you’ll learn how Active Directory simplifies requirements to meet security policies and interconnection management, how to...
  3. Cybr – Incident Response with CloudTrail and Athena

    Learn how to effectively respond to incidents in your AWS accounts regardless of whether you are running a single or multi-account setup using CloudTrail Lake and Athena — two native AWS services. This Incident Response (IR) course simulates attacks against your AWS environments that have been...
  4. Network Traffic Analysis for Incident Response by InfoSec

    Explore essential tools and techniques for handling network security. Unlock the potential of Wireshark to garner insights into traffic patterns and threats. Investigate common network threats in-depth, such as data exfiltration and multistage malware, following practical case studies. Discover...
  5. Network Traffic Analysis for Incident Response by InfoSec

    Explore essential tools and techniques for handling network security. Unlock the potential of Wireshark to garner insights into traffic patterns and threats. Investigate common network threats in-depth, such as data exfiltration and multistage malware, following practical case studies. Discover...
  6. Incident Response: Preparation | INE

    This course will introduce you to the core principles, teams, and frameworks that define modern incident response. This course begins by providing you with an overview of why incident response is critical, the types of incidents and attack vectors organizations face, and the various structures...