Schedule
Asynchronous
Delivery method
Online
12 Hours
Estimated learning time
Self-Paced
Progress at your own speed
Popular course
A popular course among students
This course provides learners with practical experience in creating an incident report for
a cyber attack and understand the process of preparing for one, taking the necessary steps to break the cyber kill chain, and conduct a root cause analysis to determine the causes of the attack.
Learners will also identify appropriate measures to address gaps identified from the root cause analysis and ensure that they are addressed in an effective and timely manner.
Schedule
Asynchronous
Delivery method
Online
Earn necessary number of credit hours for completing this content
Identified the precursors and indicators of a cyber attack
Analyzed network traffic and event logs to pinpoint the attack vector, intrusion point and time of the intrusion
Analyzed information gathered from network traffic and log analysis along with interview insights to conduct a root cause analysis using a Fishbone Diagram and the 5 - Why’s methodology
Identified appropriate measures to address gaps identified as in line with NIST SP.800-53r5
Completed a Six Sigma-based Prioritization Matrix to prioritize the measures identified to address gaps
Completed a standardized incident report including an executive summary, incident details summary, root cause analysis summary, failed controls summary, prioritization of recommendations and a conclusion
Similar Course