Introduction to Incident Response and Handling
- Types of Computer Security Incidents
- Examples of Computer Security Incidents
- Signs of an Incident
- Incident Prioritization, Response and Handling
Why are we doing this?
The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of security in their companies, possible points of entry, how operating systems are attacked, and how to protect the infrastructure from successful attacks which are sometimes caused by configuration mistakes. Understanding internal OS protection mechanisms and services/roles completely provides a huge impact on the whole infrastructure security level. Unfortunately, the problem is… rarely anyone has this impact!
Click here to browse the modules:
You should have good hands-on experience in administering Windows infrastructure with at least 8 years in the field.
You should have good understanding of how operating system works.
Ideally you should have read “Windows Internals” by Mark Russinovich book.