Certified in Cybersecurity | Incident Management - Part 5
This video covers the definitions of an Event, Alert, Incident, Problem, Inconvenience/Non-disaster, Emergency, Disaster, and Catastrophe.
Get my full Certified in Cybersecurity (CC) course with 17+ hours of videos, 260 practice questions, and a 175-page study guide for less than you spend on lunch. https://udemy.com/course/certifiedincybersecurity/
If this video was helpful please CLICK LIKE, SUBSCRIBE, and leave a comment.
It also discusses NIST 800-61, which focuses on the Incident Response Lifecycle, and the importance of having a Cyber Incident Response Team with the right mix of senior management, incident manager, technical lead, IT security, PR, HR, legal, IT auditor, and financial auditor. The lecture goes through the eight steps of Incident Management, which includes Preparation, Detection, Mitigation, Reporting, Recovery, Remediation, and Lessons Learned. The lecture concludes with the importance of Root-Cause Analysis to understand what worked well and what can be improved for future incidents.
Join our CISSP, CISM, CC, and PMP study groups on Facebook and Discord: http://fb.thorteaches.com/ ---- http://discord.thorteaches.com/
Connect with me on LinkedIn: http://linkedin.thorteaches.com/
Get our free certification newsletter: https://thorteaches.com/newsletter/
Enroll in our CISSP and CISM courses: https://thorteaches.com
I hope I can help get you certified,
Thor Pedersen
#certifiedincybersecurity #cybersecurity #certification #informationsecurity #itsecurity
Видео Certified in Cybersecurity | Incident Management - Part 5 канала ThorTeaches.com: CISSP, CC, CISM, and PMP training
Get my full Certified in Cybersecurity (CC) course with 17+ hours of videos, 260 practice questions, and a 175-page study guide for less than you spend on lunch. https://udemy.com/course/certifiedincybersecurity/
If this video was helpful please CLICK LIKE, SUBSCRIBE, and leave a comment.
It also discusses NIST 800-61, which focuses on the Incident Response Lifecycle, and the importance of having a Cyber Incident Response Team with the right mix of senior management, incident manager, technical lead, IT security, PR, HR, legal, IT auditor, and financial auditor. The lecture goes through the eight steps of Incident Management, which includes Preparation, Detection, Mitigation, Reporting, Recovery, Remediation, and Lessons Learned. The lecture concludes with the importance of Root-Cause Analysis to understand what worked well and what can be improved for future incidents.
Join our CISSP, CISM, CC, and PMP study groups on Facebook and Discord: http://fb.thorteaches.com/ ---- http://discord.thorteaches.com/
Connect with me on LinkedIn: http://linkedin.thorteaches.com/
Get our free certification newsletter: https://thorteaches.com/newsletter/
Enroll in our CISSP and CISM courses: https://thorteaches.com
I hope I can help get you certified,
Thor Pedersen
#certifiedincybersecurity #cybersecurity #certification #informationsecurity #itsecurity
Видео Certified in Cybersecurity | Incident Management - Part 5 канала ThorTeaches.com: CISSP, CC, CISM, and PMP training
Показать
Комментарии отсутствуют
Информация о видео
1 июня 2023 г. 1:00:11
00:06:22
Другие видео канала
![CISSP Domain 3: Security Architecture and Engineering - What we covered](https://i.ytimg.com/vi/XQsBTSCGCUI/default.jpg)
![CISM Domain 2 Preview | NIST SP 800 53 Revision 4](https://i.ytimg.com/vi/xhR2qH1gAiE/default.jpg)
![CISSP Domain 1: Security and Risk Management - Ethics](https://i.ytimg.com/vi/v5kPcs7WQQQ/default.jpg)
![CISSP Domain 1 Preview | General Data Protection Regulation (GDPR)](https://i.ytimg.com/vi/Wo5Gk-jdXM0/default.jpg)
![CISSP Domain 7 Security Operations: Backups](https://i.ytimg.com/vi/fCJPErIVOSk/default.jpg)
![CISM Domain 3: Information Security Program Development and Management - Security Assessments](https://i.ytimg.com/vi/fJc-v0w6tGs/default.jpg)
![Certified in Cybersecurity (CC) - Why be Certified in Cybersecurity?](https://i.ytimg.com/vi/JB_uPnprH2k/default.jpg)
![CISSP Certification Introduction - Links, important topics, and where to focus on my slides](https://i.ytimg.com/vi/S3MbmZZXuGk/default.jpg)
![CISM Domain 1: Information Security Governance - Data Classification](https://i.ytimg.com/vi/-S6z2EiNckA/default.jpg)
![CISSP Domain 7: Security Operations - What we will be covering](https://i.ytimg.com/vi/q2VVmzPep3s/default.jpg)
![Certified in Cybersecurity | Risk Management - Part 5](https://i.ytimg.com/vi/Ve-cqul6X2M/default.jpg)
![CISSP Domain 4: Communication and Network Security - Modems](https://i.ytimg.com/vi/D04q2Bd2D40/default.jpg)
![CISSP Tips and Tricks | How to design your career and certification path](https://i.ytimg.com/vi/Mr801HbaWfc/default.jpg)
![CISM Domain 1 Preview | The CIA Triad - Part 1](https://i.ytimg.com/vi/w4f-PEl1mHo/default.jpg)
![CISSP Domain 8: Software Development Security - Databases part 1](https://i.ytimg.com/vi/76HelRAgEy8/default.jpg)
![Certified in Cybersecurity | Scheduling your exam and what to expect](https://i.ytimg.com/vi/OY-6LEtx9II/default.jpg)
![Certified in Cybersecurity | Logical Access Control - Part 3](https://i.ytimg.com/vi/xi-5MQZZcD0/default.jpg)
![CISSP Tips and Tricks | How to find your study materials - Free resources](https://i.ytimg.com/vi/4YuUQGsJu3o/default.jpg)
![CISSP Tips and Tricks | How to use practice questions, deconstruct them, and time management Part 1](https://i.ytimg.com/vi/ihx269XU5Cs/default.jpg)
![CISSP Domain 2: Asset Security - What we will be covering](https://i.ytimg.com/vi/hD4ypekhYwI/default.jpg)
![CISSP Certification Introduction - I failed the CISSP certification, what should I do now?](https://i.ytimg.com/vi/VBV6O0GIng4/default.jpg)