Course Description
Master Incident Response at Your Own Pace
The Cyber Incident Response course is a self-directed, self-paced Computer Based Training (CBT) program that equips students with the skills needed to fight back against modern cyber threats. This course will teach students how to:
- Assess information security risk in computing and networking environments
- Collect cyber threat intelligence
- Analyze the cybersecurity threat landscape
- Respond to and investigate cybersecurity threats
- Analyze data collected from security event logs
- Assess and defend against post-attack techniques
Upon successfully completing this course, students will understand how to effectively prepare for, defend against and respond to successful cyber attacks.
Course Modules
-
- Module 1 - Data Collection and Analysis - Focuses on quantitative and qualitative techniques for analyzing and interpreting incident data.
- Module 2 – Vulnerability Assessment - Covers how to conduct and analyze scan results and prepare post remediation actions.
- Module 3 – The Incident Response Process - Provides an overview of the incident response process and industry best practices for preparation, response and remediation.
- Module 4 – Incident Response, Methods, Tools and Techniques - Prepares students to execute disciplined techniques and use modern tools to prepare for and respond to advanced cyber incidents.
- Module 5 – Threats and Attacks - Provides an historical look at threat trends with the intent of helping students contribute to a comprehensive defense of their organizations.
NICE Category & Specialty Area
Securely Provision (SP)
- Risk Management (RSK)
- Systems Architecture (ARC)
- Systems Requirements Planning (RP)
- Test and Evaluation (TE)
- Systems Development (SYS)
Operate and Maintain (OM)
Oversee and Govern (OV)
- Strategic Planning and Policy (SPP)
- Program/Project Management (PMA) and Acquisition
- Executive Cyber Leadership (EXL)
Protect and Defend (PR)
- Cybersecurity Defense Analysis (CDA)
- Cybersecurity Defense Infrastructure Support (INF)
- Incident Response (CIR)
- Vulnerability Assessment and Management (VAM)
Analyze (AN)
Collect and Operate (CO)
Investigate (IN)
NICE Work Roles
- All-Source Analyst
- All Source-Collection Manager
- All Source-Collection Requirements Manager
- Authorizing Official/Designating Representative
- Cyber Crime Investigator
- Cyber Defense Analyst
- Cyber Defense Forensics Analyst
- Cyber Defense Incident Responder
- Cyber Intel Planner
- Cyber Operator
- Cyber Ops Planner
- Cyber Policy and Strategy Planner
- Cyber Workforce Developer and Manager
- Executive Cyber Leadership
- Exploitation Analyst
- Information Systems Security Developer
- Program Manager
- Security Architect
- Security Control Assessor
- System Administrator
- Systems Security Analyst
- Systems Requirements Planner
- System Testing and Evaluation Specialist
- Threat/Warning Analyst
- Vulnerability Assessment Analyst
Need more information on this course?
Related Courses
Course Testimonials
“It has been a great experience learning RMF by the way of the instructor, Ashely Roan who was very knowledgeable in the field. Thank you for making the course enjoyable, relatable and memorable!”
Ashanta Gamble
“Instruction was first rate. Lunarline worked with my organization in a flexible manner allowing me to obtain the training as required. I enjoyed the instructor- knowledgeable, personable, professional, entertaining and impressive.”
Kevin Shaffer
“Excellent learning experience. Many classes taken over my career, this class offered a “real” world approach to a new methodology. Easy to follow, repetitious in the right areas. Excellent coverage of material at appropriate pace. Real world example were good!”
Deedie Weaver
“The class was excellent! I will continue to take classes from Lunarline in the future. The course material being loaded on a tablet was also a great idea because this will be a great resource to have in my future meetings.”
Nakia Jackson