This course is designed to provide the fundamental skills to manage and respond to security incidents in an information system. The course addresses various underlying principles and to detect and respond to security threats current and emerging techniques. Students will learn how to handle various types of incidents, risk assessment methodologies and the various laws and in relation to the incident management policies. After attending the course will be able to create incident management and response policies and deal with the different types of computer security incidents.
The training program Incident Management will make students competent in handling and response to various security incidents as incidents of network security, malware incidents and threats insider attack. In addition, students will learn about their role in the management and incident response. The course also covers incident response teams, training methods incident management and recovery techniques incident in detail. Certified professionals provide greater industry acceptance as incidents experienced administrator.
This course will benefit significantly incident managers, administrators, risk assessment, penetration testing, audit evaluation vulnerability, system administrators, systems engineers, firewall administrators, network administrators, IT managers, professionals iT and anyone who is interested in incident handling and response.
Agenda
Introduction to Incident Management:





Information criticizes





Detection and reporting of incidents





Final Activity - Role play



Length: Classroom training 2 days 6 hours per day.
Target:




We invite you to contact our sales department mail ventas@postech.com.mx or using our form contact online and so allow us to support you to develop a solution tailored to their needs in information technology and communications.