starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Incident Response and Handling for Cyber Security Professionals

Incident Response and Handling for Cyber Security Professionals

This course covers the six phases of incident handling and responding to help you become a professional cybersecurity incident handling team member or team leader

Mohammad Adly
Mohammad Adly
Cybersecurity | core | 1 hour |   Published: Nov 2021

    Discussions

Overview

1.3KSTUDENTS*
94%RECOMMEND*

This course includes:

  • 1+ hours of on-demand video
  • 7 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others 

Skills You Will Gain

Cybersecuirty
IT Managers

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Handle and respond to cybersecurity incidents in your organization 

 

Prerequisites

  • None 

 

Who Should Attend

  • Cyber security professionals 
  • Software developers 
  •  IT managers 

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Welcome to the course!
2Module 01: Course Introduction
3Module 02: Preparation
4Module 03: Identification
5Module 04: Containment
6Module 05: Eradication
7Module 06: Recovery
8Module 07: Course Conclusion

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

About this course: Overview, Learning Outcomes, Who Should Enroll...

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 01 - Introduction

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 06 - Deployment and Categorization

Segment - 07 - Short-term and Long-term Actions

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 04 - Where Does Identification Occur?

Segment - 05 - What to Check?

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 10 - Meet, Fix, and Share

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 08 - Restoring and Improving Defenses

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 09 - Validation and Monitoring

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 02 - Preparation of People and Policy

Segment - 03 - Team Building and Management

Mohammad Adly

Mohammad Adly

Mohammad Adly is a distinguished expert in computer engineering and electronic sciences, holding a Ph.D. focused on enhancing congestion control mechanisms for internet media traffic. His doctoral research at Menoufiya University introduced advanced methodologies aimed at optimizing network performance for media applications, making significant contributions to the field of network traffic management. He also earned an M.Sc. from the same institution, where his thesis centered on video services for remote work within IP environments, showcasing his deep expertise in video communication technologies. His strong academic foundation in computer networks was further reinforced through an Information Technology Diploma from the Information Technology Institute (ITI), followed by research experience at the IRISA Institute, Rennes I University in France. There, he explored innovative solutions in network security and performance, gaining valuable international research exposure. Mohammad holds several prestigious certifications, including the Lean Six Sigma Green Belt and multiple GIAC security certifications. He has contributed extensively to the academic community through numerous publications covering topics such as TCP-friendly rate control, media traffic congestion control, and adaptive video streaming systems. His work has been featured in leading journals and international conferences, reflecting his dedication to advancing technology and its real-world applications.
VIEW MY CHANNEL