If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand threat response. By the end of the course, you will be able to: • Explain the purpose of incident response planning • Describe the typical incident response life cycle • Describe the typical elements within an incident response policy • Describe how incidents can be classified. • Describe the different US-CERT incident categories (CAT 0 to CAT 6) • Describe compliance regulations that contain incident response requirements • Describe the different general CSIRT categories • Describe the basic framework that defines a CSIRT• Describe the different CSIRT incident handling services: triage, handling, feedback, and optional announcement • Describe a typical incident response plan and the functions of a typical CSIRT. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Threat Response
This course is part of Cybersecurity Operations Fundamentals Specialization
Instructor: Cisco Learning & Certifications
Sponsored by InternMart, Inc
2,342 already enrolled
(35 reviews)
Details to know
Add to your LinkedIn profile
15 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 2 modules in this course
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand threat response. By the end of the course, you will be able to: • Explain the purpose of incident response planning • Describe the typical incident response life cycle • Describe the typical elements within an incident response policy • Describe how incidents can be classified. • Describe the different US-CERT incident categories (CAT 0 to CAT 6) • Describe compliance regulations that contain incident response requirements • Describe the different general CSIRT categories • Describe the basic framework that defines a CSIRT• Describe the different CSIRT incident handling services: triage, handling, feedback, and optional announcement • Describe a typical incident response plan and the functions of a typical CSIRT. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
What's included
11 videos11 readings9 assignments1 discussion prompt
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you describe the use of Vocabulary for Event Recording and Incident Sharing (VERIS). By the end of the course, you will be able to: • Explain the use of VERIS to document security incidents in a standard format. • Explain VERIS. • Explain the VERIS incidents structure. • Explain the VERIS 4 A's. • Describe a typical VERIS record. • Describe the VERIS community database. • Describe the Verizon Data Breach Investigations Report and the Cisco Annual Security Report. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
What's included
7 videos12 readings6 assignments
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Information Technology
Kennesaw State University
Kennesaw State University
Emory University
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy