Course Overview

Take the Security Incident Response approach in order to cover the Data Breach process required by the GDPR Data Privacy Protection.

In this course, you will learn what Security Incident Response is and how it relates to GDPR Data Privacy, and you will do it from 3 perspectives: theory, processes and technology.   You will be able to apply our security methodologies, security frameworks, and security processes to your own environment.

The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand Security Incident Response challenges, the difference between a NOC and a SOC (Security Operation Center), and how the latest can help in defining the Security Incident Response Process.  We will follow up with GDPR Data Protection & Privacy relation and the impact of GDPR on Security Incident Response for any organization. We will learn about methodologies, frameworks, and playbooks; we will draft 2 procedures, and we will see how technology can help us in the roadmap.  

In the end, I will give an incredible collection of incident response-free tools and resources I have built during that time and I will teach how malware works, especially in the financial market.   

The course is delivered in a mix of over-the-shoulder lessons and PowerPoint presentations. So, either I show you click on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey. 

I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.   We will not present only what you need to do, but in the end, we will also create some examples from the real world, and let you know how these were treated by those companies. You will have a totally clear view of the Data Privacy Officer or any other Privacy Professional role after passing this course and you will be able to engage in Interviews by yourself. Privacy or Data Protection is the hottest topic today, so why not make a significant change in your career and EARN MORE MONEY?

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Build-Security-Incident-Response-for-GDPR-Data-Protection

What You Will Learn

  • Understand what incident response is
  • Will have a list of templates to use
  • Will have a list of incident response tools and resources
  • Will have a list of incident response playbooks

Program Curriculum

  • Welcome & intro
  • Set your expectations
  • A 1st touch of what you will really get in the course
  • $7 Million Cybersecurity Scholarship by EC-Council

  • What is Incident Response and why do I need it?
  • Incident Response Team
  • Incident Response Process and Procedures
  • Types of Security Incidents
  • Incident Response Tools - general
  • What is a SIEM?
  • Incident Response Training
  • What is automation in incident response
  • Chapter 2 Quiz

  • What is a NOC?
  • What is a SOC?
  • Integrated NOC and SOC
  • Mission, Team and Required Training
  • Types of SOC
  • Building a SOC
  • Cheat Sheets to help you in configuring your systems
  • Chapter 3 Quiz

  • GDPR intro
  • GDPR effects on Incident Response
  • How to create an effective IR plan
  • GDPR Incident Response Process
  • Let’s draft the IRM Procedure
  • How to treat data breaches
  • Chapter 4 Quiz

  • IRM1 - Worm Infection
  • IRM2 - Windows Intrusion
  • IRM3 - Unix/Linux Intrusion Detection
  • IRM4 - DDoS
  • IRM5 - Malicious Network Behavior
  • IRM6 - Website Defacement
  • IRM7 - Windows malware detection
  • IRM8 - Blackmail
  • IRM9 - Smartphone Malware
  • IRM10 - Social Engineering
  • IRM11 - Information Leakage
  • IRM12 - Insider Abuse
  • IRM13 - Phishing
  • IRM14 - Scam
  • IRM15 - Ransomware
  • Chapter 5 Quiz

  • Lessons learned by working in a SOC
  • A list of open source tools to use
  • ATP incident response
  • Chapter 6 Quiz

  • Today’s Challenges
  • Target and Distribution
  • Attack Methods
  • Infection Vectors
  • Targeted attacks against financial institutions
  • Mobile platform and email scams
  • Takedowns and Conclusions
  • Chapter 7 Quiz

  • Past 3 decades of malware (part 1)
  • Past 3 decades of malware (part 2)
  • The architecture of financial malware
  • Zeus
  • Zeus GameOver
  • SpyEye
  • IceIX
  • Citadel
  • Carberp
  • Shylock
  • Bugat
  • Dyre
  • Dridex
  • Shifu
  • Tinba
  • Chapter 8 Quiz

  • Why Fraud Risk Engines fail
  • How to bypass 2 factor authentication (2FA)
  • Fraud Prevention Technology
  • Compliance and Legal Issues
  • Customer impact
  • Selecting the right cybercrime solution
  • Malware detection
  • Malware detection - Advanced
  • Malware detection - how technology can help
  • Criminal Detection & Account Takeover
  • Account Takeover - Product Architecture
  • What about mobile banking?
  • Chapter 9 Quiz

  • Simple lab setup
  • XSRF attack
  • Compromising Public server
  • Break-In: Compromising the victim computer
  • Other Web Application Attack Example
  • Locky Ransomware
  • Gathering Info & Exfiltrate
  • Chapter 10 Quiz

Final thoughts and conclusion

Load more modules

Instructor

Roland Costea

Trainer

Roland is a cybersecurity, privacy, and cloud leader and strategist with a demonstrated experience in running cybersecurity & cloud business units, practices, divisions from zero to maturity with year over year quality growth and quota over-achievement (projects of more >50 million euro/year). Roland has the following certifications: CISSP, CIPM, CIPT, CIPP/E, CRISC, CISM, CCSK v4, CCSP, LPT, CEH, ISO 27001LA, TOGAF.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8