Course Highlights
  • Understand what incident response is
  • Will have a list of templates to use
  • Will have a list of incident response tools and resources
  • Will have a list of incident response playbooks
Skills you will learn!
Curriculum

6 Topics
Welcome & Intro
Set your expectations
A 1st touch of what you will really get in the course
My first promise to you - get certified in less than 30 days: CIPT CIPM CIPP/E
Presentations (ppt)
One more word before we start

8 Topics
What is Incident Response and why do I need it?
Incident Response Team
Incident Response Process and Procedures
Types of Security Incidents
Incident Response Tools - general
What is a SIEM?
Incident Response Training
What is automation in incident response

7 Topics
What is a NOC?
What is a SOC?
Integrated NOC and SOC
Mission Team and Required Training
Types of SOC
Building a SOC
Cheat Sheets to help you in configuring your systems

6 Topics
GDPR intro
GDPR effects on Incident Response
How to create an effective IR plan
GDPR Incident Response Process
Lets draft the IRM Procedure
How to treat data breaches

15 Topics
IRM1 - Worm Infection
IRM2 - Windows Intrusion
IRM3 - Unix/Linux Intrusion Detection
IRM4 - DDoS
IRM5 - Malicious Network Behaviour
IRM6 - Website Defacement
IRM7 - Windows malware detection
IRM8 - Blackmail
IRM9 - SmartphoneMalware
IRM10 - Social Engineering
IRM11 - Information Leakage
IRM12 - Insider Abuse
IRM13 - Phishing
IRM14 - Scam
IRM15 - Ransomware

3 Topics
Lessons learned by working in a SOC
A list of open source tools to use
Windows Defender ATP

7 Topics
Today Challenges
Target and Distribution
Attack Methods
Infection vectors
Targeted attacks against financial institutions
Mobile platform and email scams
Takedowns and Conclusions

15 Topics
Past 3 decades of malware (part 1)
Past 3 decades of malware (part 2)
The architecture of financial malware
Zeus
Zeus GameOver
SpyEye
IceIX
Citadel
Carberp
Shylock
Bugat
Dyre
Dridex
Shifu
Tinba

11 Topics
Why Fraud Risk Engines fail
How to bypass 2 factor authentication (2FA)
Fraud Prevention Technology
Compliance and Legal Issues
Customer impact
Selecting the right cybercrime solution
Malware detection
Malware detection - advanced
Malware detection - how technology can help
Criminal Detection & Account Takeover
What about mobile banking?

7 Topics
Lab setup
XSRF attack
Compromising Public server
Break-In: Compromising the victim computer
Other Web Application Attack Example
Locky Ransomware
Gathering Info & Exfiltrate

3 Topics
Final thoughts and other documents
BONUS - Remember my first promise to you - get certified in less than 30 days?
BONUS 2 - How to get more content and help me create more!

  Write a Review

Build Security Incident Response for GDPR data protection

Go to Paid Course