Cybersecurity - Incident Reporting and Response in Energy
12 Hours
Estimated learning time
Self-Paced
Progress at your own speed
Popular course
A popular course among students
About the Course
Description
This course provides learners with practical experience in creating an incident report for a cyber attack and understand the process of preparing for one, taking the necessary steps to break the cyber kill chain, and conduct a root cause analysis to determine the causes of the attack. Learners will also identify appropriate measures to address gaps identified from the root cause analysis and ensure that they are addressed in an effective and timely manner.
Topics
- Intro to ISMS and Cybersecurity Intro to Cybersecurity Incident Reporting Cyber Kill Chain Analysis Preparing for a Cyber Attack and Containment Detection and Root Cause Analysis Addressing gaps using appropriate measures Prioritizing recommendations based on risk
Sections
Schedule
Asynchronous
Delivery method
Online
Outcomes
Identified the precursors and indicators of a cyber attack
Analyzed network traffic and event logs to pinpoint the attack vector, intrusion point and time of the intrusion
Analyzed information gathered from network traffic and log analysis along with interview insights to conduct a root cause analysis using a Fishbone Diagram and the 5 - Why’s methodology
Identified appropriate measures to address gaps identified as in line with NIST SP.800-53r5
Completed a Six Sigma-based Prioritization Matrix to prioritize the measures identified to address gaps
Completed a standardized incident report including an executive summary, incident details summary, root cause analysis summary, failed controls summary, prioritization of recommendations and a conclusion
Similar Course