Oreilly - Hands-On Incident Response Analysis - 9781838552046
Oreilly - Hands-On Incident Response Analysis
by Sunil Gupta | Publisher: Packt Publishing | Release Date: April 2019 | ISBN: 9781838552046


Plan and execute effective incident response protocols for your organizationAbout This VideoIdentify various types of attacks on networks, websites, and applicationsPrevent attacks and maintain security using best practice incident handling protocolsImplement key incident handling tools to protect your technological assetsIn DetailCyber attacks take place every minute of the day around the world. Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack. Responding to any incident rapidly will help your organization minimize losses, mitigate any vulnerabilities, restore services and processes as quickly as possible, and reduce the risk of being attacked in the future. Incident response strategies prepare an organization for the unknown. They comprise a dependable method for detecting a security instance instantly when it occurs, and addressing it effectively.In this course, you will learn the core principles of hands-on incident response (IR). You will look at the major symptoms, defenses against them, and what to do when an incident happens, along with how to detect incidents in the first place. You will explore the actual workflow steps that every security professional should follow to ensure consistency in your incident identification and resolution approaches. Moving on, you will delve into some more common incidents that could affect your network by reviewing how to handle and respond to issues such as a DoS, a session hijack, or even malicious code. By taking this course, you will be able to differentiate between commodity and Advanced Persistent Threat (APT) attack groups. You will explore how to review alerts, log files, and recognize common character encodings and carrier files.By the end of this course, you will be ready to take on incident response strategies pre-emptively and confidently, and you'll be able to identify the various (and sometimes subtle) signs that may indicate you've had an incident or one's coming your way.
  1. Chapter 1 : Discovering Incident Response
    • The Course Overview 00:01:30
    • Identification, Initial Recording, and Response 00:03:33
    • Incident Communication and Containment 00:02:38
    • Response Strategy Formulation 00:02:20
    • Incident Classification and Investigation 00:02:27
    • Forensics and Eradication 00:03:07
    • Incident Documentation 00:02:26
  2. Chapter 2 : Detecting and Preventing Attacks on the Host and Networks
    • Section Introduction 00:01:27
    • Denial-of-Service Attack Detection and Prevention 00:08:31
    • Unauthorized Attack Detection and Prevention 00:12:07
    • Inappropriate Usage Detection and Prevention 00:10:55
    • Multiple Component Issues, Detection, and Prevention 00:05:07
  3. Chapter 3 : Building Defense for Services and Attacks on Applications
    • Introducing the Section 00:01:23
    • Session Hijacking Symptoms and Defense 00:04:52
    • SQL Injection Attack Symptoms and Defense 00:05:12
    • Cross-site Scripting Attack Symptoms and Defense 00:05:04
    • Buffer Overflow Attack Symptoms and Defense 00:04:29
  4. Chapter 4 : Detecting and Handling Malicious Code
    • Signs of Malware Code 00:03:20
    • Bot and Botnets 00:03:25
    • Rootkit in Windows 00:05:05
    • Detection and Prevention of Malicious Code 00:03:37
  5. Chapter 5 : Implementing Forensics for Incident Response
    • Forensics Investigation 00:02:39
    • Capturing Data and Imaging 00:02:23
    • FTK Imaging Software 00:06:20
    • Memory Analysis Using Volatility 00:09:26
    • The Autopsy Program 00:07:53
  6. Chapter 6 : Preventing Insider Threats: Detection and Handling
    • Workflow of Insider Threats 00:03:18
    • Detection and Response for Insider Attacks 00:02:17
    • Insider Threats Prevention: Network Level 00:02:41
    • Insider Threats Prevention: Access Control 00:02:47
    • Insider Threats Prevention: Privileged Users 00:03:04
    • Insider Threats Prevention: Backup 00:03:07
  7. Oreilly - Hands-On Incident Response Analysis


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss