Course Overview

Incident response (IR) is a structured methodology for handling security incidents, breaches, and cyber threats. A well-defined incident response plan (IRP) allows you to effectively identify, minimize the damage, and reduce the cost of a cyber-attack while finding and fixing the cause to prevent future attacks.

 This course covers the six phases of incident handling and responding as follows:

Introduction: Includes the definition of an event, or incident, as well as the difference between them.

Preparation: Shows the elements of preparation and team building.

Identification: Demonstrates where identification occurs and the assessment for identification.

Containment: Explains the deployment and categorization needed as well as the short/long-term actions taken.

Eradication: Stresses on restoring systems and improving defenses.

Recovery: Elaborates on the validation and monitoring required for attacked systems.

Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others.

 By the end of this course, you will master the technique of handling and responding to a cybersecurity incident.

What You Will Learn

  • Handle and respond to cyber security incidents in your organization.
  • Learn about team building and management.
  • Discover how to restore and improve defenses.

Program Curriculum

  • Introduction
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Preparation of People and Policy
  • Team Building and Management
  • Chapter 2 Quiz

  • Where Does Identification Occur?
  • What to Check?
  • Chapter 3 Quiz

  • Deployment and Categorization
  • Short-term and Long-term Actions
  • Chapter 4 Quiz

  • Restoring and Improving Defenses
  • Chapter 5 Quiz

Validation and Monitoring

Meet, Fix, and Share

Load more modules

Instructor

Mohammad Adly Adly

Dr. Mohammad Adly Ph. D. Networks and Cybersecurity, Faculty of Electronic Engineering, Menoufiya University, Egypt, 2014 M. Sc. Computer Science and Engineering, Faculty of Electronic Engineering, Menoufiya University, Egypt, 2005 Researcher in IRISA, Rennes University, France, 2001 B. Sc. Communication and Electronic Engineering, Cairo University, 1998, Egypt Main research interests include computer networks and protocols, cybersecurity, congestion control, QoS, and multimedia networking Published more than 10 papers in reputed international journals proceedings and supervised more than 50 graduation projects

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8