Course
Data/Business
Continuing Education

Cybersecurity - Incident Reporting and Response in Energy

12 Hours

Estimated learning time

Self-Paced

Progress at your own speed

Popular course

A popular course among students

About the Course

Description

This course provides learners with practical experience in creating an incident report for a cyber attack and understand the process of preparing for one, taking the necessary steps to break the cyber kill chain, and conduct a root cause analysis to determine the causes of the attack. Learners will also identify appropriate measures to address gaps identified from the root cause analysis and ensure that they are addressed in an effective and timely manner.

Topics

  • Intro to ISMS and Cybersecurity Intro to Cybersecurity Incident Reporting Cyber Kill Chain Analysis Preparing for a Cyber Attack and Containment Detection and Root Cause Analysis Addressing gaps using appropriate measures Prioritizing recommendations based on risk

Sections

Schedule

Asynchronous

Delivery method

Online

Outcomes

Identified the precursors and indicators of a cyber attack

Analyzed network traffic and event logs to pinpoint the attack vector, intrusion point and time of the intrusion

Analyzed information gathered from network traffic and log analysis along with interview insights to conduct a root cause analysis using a Fishbone Diagram and the 5 - Why’s methodology

Identified appropriate measures to address gaps identified as in line with NIST SP.800-53r5

Completed a Six Sigma-based Prioritization Matrix to prioritize the measures identified to address gaps

Completed a standardized incident report including an executive summary, incident details summary, root cause analysis summary, failed controls summary, prioritization of recommendations and a conclusion

Outcomes Image