ISC2

Incident Response and Recovery

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

4 hours to complete
3 weeks at 1 hour a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

4 hours to complete
3 weeks at 1 hour a week
Flexible schedule
Learn at your own pace

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

September 2024

Assessments

17 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the ISC2 Systems Security Certified Practitioner (SSCP)
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There is 1 module in this course

Having an intruder inside your systems for months, unnoticed by system administrators, security specialists and end users alike, is tantamount to giving the intruder the keys to your business or organization. In far too many cases, organizations discover that they have been subjected to a data breach by being told by someone else that their private data has been offered for sale on the dark web. Leading voices within the security profession state we must do better at detecting the intruder in our midst; many say that detecting the intruder should be the priority for security professionals. Ransomware attacks have become big business, involving not only large-scale extortion attacks but also the selling of ransomware attack tools and services and exploitation of data exfiltrated during the breach. Government officials and industry professionals around the world, such as Anne Neuberger, U.S. Deputy National Security Advisor for Cyber and Emerging Technology, have raised their voices about this “new and very troubling variant” in the advanced persistent threat (APT) attackers’ business model. In this course, we will focus on incident response and recovery. We will explore the incident life cycle as defined by NIST and continue with a deeper look at supporting forensic investigations. We will also extend these ideas and concepts around the theme of business continuity and disaster recovery.

What's included

4 videos35 readings17 assignments

Instructor

ISC2 Education & Training
ISC2
30 Courses90,780 learners

Offered by

ISC2

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions