- Level Foundation
- Duration 23 hours
- Course by ISC2
-
Offered by
About
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures. Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery. Course Objectives 1. Describe the risk management process 2. Perform security assessment activities 3. Describe processes for operating and maintaining monitoring systems 4. Identify events of interest 5. Describe the various source systems 6. Interpret reporting findings from monitoring results 7. Describe the incident handling process 8. Contribute to the incident handling process based upon role within the organization 9. Describe the supporting role in forensics investigation processes 10. Describe the supporting role in the business continuity planning process 11. Describe the supporting role in the disaster recovery planning processModules
Discussion
1
Discussions
- Today's Risk
Risk Management Process
14
Videos
- Risk Management Process: Risk Visibility and Reporting
- Risk Management Process: Creating a Risk Register
- Risk Management Process: Risk Register Risk Management Steps
- Risk Management Process: Key Terms
- Risk Management Process: Key Terms
- Risk Management Process: Risk Assessment
- Risk Management Process: Preparation Steps
- Risk Management Process: Step 2b
- Risk Management Process: Quantitative Analysis
- Risk Management Process: Qualitative Analysis
- Risk Management Process: Step 3
- Risk Management Process: Risk Treatment
- Risk Management Process: Risk Avoidance
- Risk Management Process: Type of Audits
14
Readings
- Risk Management Process: Risk Visibility and Reporting
- Risk Management Process: Creating a Risk Register
- Risk Management Process: Risk Register Risk Management Steps
- Risk Management Process: Key Terms
- Risk Management Process: Key Terms
- Risk Management Process: Risk Assessment
- Risk Management Process: Preparation Steps
- Risk Management Process: Step 2b
- Risk Management Process: Quantitative Analysis
- Risk Management Process: Qualitative Analysis
- Risk Management Process: Step 3
- Risk Management Process: Risk Treatment
- Risk Management Process: Risk Avoidance
- Risk Management Process: Type of Audits
Week 1 Quiz
1
Assignment
- Quiz 1
Discussion
1
Discussions
- Discussion: Identifying Risk
Perform Security Assessment Activities
11
Videos
- Security Assessment Activities: Participate in Security and Test Results
- Security Assessment Activities: Potential Problems
- Assessment Activities: Security Gateway Types
- Security Assessment Activities: Potential Security Issues
- Security Assessment Activities: Penetration Testing
- Security Assessment Activities: White Box / Hat
- Security Assessment Activities: Reconnaissance
- Security Assessment Activities: DNS Zone Transfers
- Security Assessment Activities: Network Mapping Techniques
- Security Assessment Activities: Firewalking
- Security Assessment Activities: Active Penetration
11
Readings
- Security Assessment Activities: Participate in Security and Test Results
- Security Assessment Activities: Potential Problems
- Assessment Activities: Security Gateway Types
- Security Assessment Activities: Potential Security Issues
- Security Assessment Activities: Penetration Testing
- Security Assessment Activities: White Box / Hat
- Security Assessment Activities: Reconnaissance
- Security Assessment Activities: DNS Zone Transfers
- Security Assessment Activities: Network Mapping Techniques
- Security Assessment Activities: Firewalking
- Security Assessment Activities: Active Penetration
Week 2 Quiz
1
Assignment
- Quiz 2
Discussion
1
Discussions
- Discussion: Benefits of Security Investment
Operate and Maintain Monitoring Systems
9
Videos
- Monitoring Systems: Monitoring Terminology
- Monitoring Systems: IDS/IPS
- Monitoring Systems: Implementation Issues for Monitoring
- Maintain Monitoring Systems: Sample Questions
- Maintain Monitoring Systems: Attacker Motivations
- Maintain Monitoring Systems: Logging
- Maintain Monitoring Systems: Log Anomalies
- Maintain Monitoring Systems: Log Retention
- Monitoring Systems: Compliance
9
Readings
- Monitoring Systems: Monitoring Terminology
- Monitoring Systems: IDS/IPS
- Monitoring Systems: Implementation Issues for Monitoring
- Maintain Monitoring Systems: Sample Questions
- Maintain Monitoring Systems: Attacker Motivations
- Maintain Monitoring Systems: Logging
- Maintain Monitoring Systems: Log Anomalies
- Maintain Monitoring Systems: Log Retention
- Monitoring Systems: Compliance
Analyze and Report Monitoring Results
3
Videos
- Monitoring Results: Security Baseline
- Monitoring Results: SSE-CMM
- Monitoring Results: Potential Uses of Server Log Data
3
Readings
- Monitoring Results: Security Baseline
- Monitoring Results: SSE-CMM
- Monitoring Results: Potential Uses of Server Log Data
Week 3 Quiz
1
Assignment
- Quiz 3
Discussion
1
Discussions
- Discussion: key Areas
Participate in Incident Handling
13
Videos
- Incident Handling: Incident Response
- Incident Handling: Preparation
- Incident Handling: Training
- Incident Handling: Communication Planning
- Incident Handling: The Incident Response Team
- Incident Handling: IDS and IPS
- Incident Handling: Intrusion Detection Techniques
- Incident Handling: Anti-Malware Systems
- Incident Handling: Packet Sniffers
- Incident Handling: SSL Decryption Devices
- Incident Handling: Records
- Incident Handling: Delaying Containment
- Incident Handling: Containment, Eradication, and Recovery
13
Readings
- Incident Handling: Incident Response
- Incident Handling: Preparation
- Incident Handling: Training
- Incident Handling: Communication Planning
- Incident Handling: The Incident Response Team
- Incident Handling: IDS and IPS
- Incident Handling: Intrusion Detection Techniques
- Incident Handling: Anti-Malware Systems
- Incident Handling: Packet Sniffers
- Incident Handling: SSL Decryption Devices
- Incident Handling: Records
- Incident Handling: Delaying Containment
- Incident Handling: Containment, Eradication, and Recovery
Week 4 Quiz
1
Assignment
- Quiz 4
Understand and Support Forensic Investigations
3
Videos
- Forensic Investigation: Crime Scene
- Forensic Investigation: General Guidelines
- Forensic Investigation: Hash Algorithms
3
Readings
- Forensic Investigation: Crime Scene
- Forensic Investigation: General Guidelines
- Forensic Investigation: Hash Algorithms
Understand and Support Business Continuity and Disaster Recovery Plan
15
Videos
- BCP and DRP: Emergency Response
- BCP and DRP: Comparing BCP and DRP
- BCP and DRP: Business Impact Analysis
- BCP and DRP: Recovery Time Objective
- BCP and DRP: BIA
- BCP and DRP: Business Continuity Activity
- BCP and DRP: Disaster Recovery Planning
- BCP and DRP: Related Documents
- BCP and DRP: Multiple Processing Sites
- BCP and DRP: Backup and Redundancy Implementation
- BCP and DRP: Off-Site Storage
- BCP and DRP: RAID Levels
- BCP and DRP: RAID Levels
- BCP and DRP: Testing and Drills
- BCP and DRP: Full Interruption Testing
15
Readings
- BCP and DRP: Emergency Response
- BCP and DRP: Comparing BCP and DRP
- BCP and DRP: Business Impact Analysis
- BCP and DRP: Recovery Time Objective
- BCP and DRP: BIA
- BCP and DRP: Business Continuity Activity
- BCP and DRP: Disaster Recovery Planning
- BCP and DRP: Related Documents
- BCP and DRP: Multiple Processing Sites
- BCP and DRP: Backup and Redundancy Implementation
- BCP and DRP: Off-Site Storage
- BCP and DRP: RAID Levels
- BCP and DRP: RAID Levels
- BCP and DRP: Testing and Drills
- BCP and DRP: Full Interruption Testing
Week 5 Quiz
1
Assignment
- Quiz 5
Identifying, Monitoring, and Analyzing Risk and incident Response and Recovery Case Study
1
Peer Review
- Risk Response Recovery and Incident Management Case Study
Exam Informaton
1
Readings
- SSCP Exam Information
End-of-Course Assessment
1
Assignment
- End-of-Course Exam
Auto Summary
Unlock the essentials of risk management and incident response with the "Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery" course. Designed for IT and computer science professionals, this foundational course is instructed by experts from Coursera and spans a comprehensive 1380 minutes of in-depth learning. Dive into the intricacies of risk identification, monitoring, and analysis, where you'll master techniques to measure and control losses from adverse events, evaluate safeguards, and ensure compliance with industry standards and organizational policies. You'll also learn how to collect, prioritize, and report on security events effectively. The course further explores incident response and recovery, teaching you consistent and applied methods to handle incidents, recover from damages, preserve data integrity, and prevent future incidents. You will also gain insights into the critical concepts of Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), essential for mitigating damages and ensuring smooth recovery post-disaster. By the end of this course, you will be equipped to: - Navigate the risk management process - Conduct security assessments - Maintain and operate monitoring systems - Identify significant security events - Interpret monitoring results - Manage incidents and contribute to forensic investigations - Support business continuity and disaster recovery planning Available through Coursera with Starter and Professional subscription options, this course is perfect for IT professionals looking to enhance their skills in risk management and incident response. Enroll today to ensure your organization is prepared for any adverse events and can swiftly recover from disruptions.

ISC2 Education & Training