N2K Incident Response Training Course
Build and enhance incident response skills.
Enterprise organizations are bombarded by cybersecurity attacks on a daily basis. It’s not a matter of if a breach will occur; rather it’s a question of when and to what extent. Incident Response teams can work quickly to contain and mitigate a breach. Yet, upskilling individuals to act in a full IR capacity is not an easy task. The industry doesn’t yet offer an incremental learning path from a SOC Analyst or Cybersecurity Specialist role directly feeding into IR.
CyberVista now offers a 100% online training program designed to develop Incident Responders quickly and cost effectively. N2K’s Incident Response course is a comprehensive offering that builds on the Critical Knowledge training program. This course goes beyond fundamental concepts and dives into technical and task-oriented subject matter designed specifically for Incident Responders. Team members working within a CERT (computer emergency response team), CSIRT (computer security incident response team), CIRT (computer/cybersecurity incident response team), or broader SOC (security operations center) would benefit greatly from this course.
Unit 0: Foundational Knowledge
Learners will establish or revisit foundational concepts necessary to building knowledge and skills in later units.
- 0.1 Networking Basics
- 0.2 Host Basics
- 0.3 Indicators of Compromise
Unit 1: IR Overview
Learners will understand various roles within an organization and their responsibilities prior to, during, and after an incident occurs.
- 1.1 Incident Response Overview
- 1.2 Roles and Responsibilities
- 1.3 Policies and Procedures
Unit 2: Attack Lifecycle
Learners will understand the Cyber KillChain and the Mitre Attack Framework. These are important to understanding the phases of an attack and how to determine a resolution.
- 2.1 Cyber Kill Chain
- 2.2 Mitre Attack Framework
Unit 3: Host and Network-Based Detection and Resolution
Learners will become familiarized with means of detection and resolution of network intrusions and malware attacks.
- 3.1 Network Analysis and Attack Identification
- 3.2 Host and Network Intrusions
- 3.3 Malware and Rogue Device Detection
Unit 4: Attack Patterns and Mechanisms
Learners will be able to understand attacks listed in the OWASP Top Ten, the methods that these attacks propagate and affect an organization, and remediation techniques.
- 4.1 Network-Based Attacks
- 4.2 Host-Based Attacks
- 4.3 Attack Methods
Unit 5: Forensics
Learners will become familiar with digital forensics, techniques used, case studies, and additional hands-on exercises.
- 5.1 Forensics in IR
- 5.2 Forensics Methodologies
- 5.3 IR Case Study
- 5.4 IR Activity