Responding to a Breach
*(ISC)² Members/Associates can access this course for free by logging in above and clicking the 'My Courses' menu item.
This interactive, immersive course takes you inside a cybersecurity breach scenario and helps you design your own cybersecurity response plan.
This course includes the following five (5) modules: (1) The Phone Rings (2) Detection and Analysis (3) Investigation, Containment, and Mitigation (4) Recovery and Notification and (5) Post-Incident Review.
Audience or Who Should Take This Course
Experienced cyber, information, software and infrastructure security professionals who want to learn how to apply a framework and phased approach for responding to a breach.
Familiarity with Security Concepts
How This Course Works
Each module begins with an introductory presentation that introduces key concepts based on specific learning objectives, incorporates knowledge checks to ensure understanding and provides access to relevant resources. You will then be guided to read relevant thought leadership via articles, blogs and presentation written by industry experts that expand on the concepts covered in the introductory presentation. The module will conclude with an interactive exercise designed to reinforce learning. All learning components in each module must be completed before advancing to the next module.
At the end of the course you will be asked to take a final assessment. Please note that you must score 70% or higher on the final assessment prior to receiving a certificate of completion and earning five (5) continuing professional education (CPE) credits.
Please make sure at the end of the course that you download and retain the certificate of completion as proof of credits earned. CPEs earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.