Take your incident response plans to the next level by exploring this “Implementing an Incident Response Plan” course with David Biser. He walks you through incident identification, the incident management process, and how to recover from an incident.
Finished “Incident Response Planning” on Cybrary.it
In Incident Response Planning, David Biser describes the different aspects to consider when creating and implementing an incident response plan. These different aspects act as tools that help an organization create a thorough incident response plan.
Finished “Kali Linux Fundamentals” on Cybrary.it
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is a great place to start your training. Learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.
Attended webinar “Your Network, Under Control” by SANS Institute
Attended webinar “Live Hacking Session – Your app is only as secure as your weakest line of code. Shall we hack it?” by SANS Institute
Attended webinar “How does your incident response program stack up?” by SANS Institute
Finished “Malware Threats” on Cybrary.it
Interested in penetration testing and malware analysis? This malware course introduces you to different types of malware, like viruses, worms, and Trojans. Gain hands-on experience in analyzing malicious files, identifying malicious processes, and more.
Finished “Intro to Cyber Threat Intelligence” on Cybrary.it
As attackers and defenders continually try to outsmart one another in this evolving cybersecurity landscape, organizations need to be smart about gathering and analyzing cyber threat intelligence (CTI).This cyber threat intelligence training introduction series will cover the main definitions and concepts related to the CTI world.