CISM Cert Prep: 4 Information Security Incident Management

Go to class
Write Review

Free Online Course: CISM Cert Prep: 4 Information Security Incident Management provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CISM Cert Prep: 4 Information Security Incident Management is taught by Mike Chapple.

Overview
  • Study for the Incident Management domain of the CISM certification exam, which tests your ability to identify, triage, and resolve security incidents.

Syllabus
  • Introduction

    • Information security incident management
    • What you need to know
    • Study resources
    1. Incident Response
    • The manager's role in incident response
    • Creating an incident response team
    2. Assessing Incidents
    • Identifying and classifying security incidents
    • Threat classification
    • Zero days and the advanced persistent threat
    • Determining incident severity
    3. Incident Response Process
    • Build an incident response program
    • Incident communications plan
    • Incident identification
    • Escalation and notification
    • Mitigation
    • Containment techniques
    • Incident eradication and recovery
    • Validation
    • Lessons learned and reporting
    4. Incident Symptoms
    • Network symptoms
    • Rogue access points and evil twins
    • Endpoint symptoms
    • Application symptoms
    5. Forensic Investigations
    • Conducting investigations
    • Evidence types
    • Introduction to forensics
    • System and file forensics
    • Creating forensic images
    • Digital forensics toolkit
    • Operating system analysis
    • Password forensics
    • Network forensics
    • Software forensics
    • Mobile device forensics
    • Embedded device forensics
    • Chain of custody
    • Ediscovery and evidence production
    6. Logging and Monitoring
    • Correlating security event information
    • Continuous security monitoring
    • Data loss prevention
    Conclusion
    • Next steps