Completed
What logs to store?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Ready for - Nearly Anything - Preparing Your Organisation for a Cyber Incident
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Let's talk about cyber incidents
- 3 Five things to prepare for a cyber incident
- 4 Key processes for an incident response team
- 5 The hierarchy of incident response processes
- 6 Resourcing an incident response function
- 7 Roles required for incident response
- 8 What logs to store?
- 9 How long to store logs for?
- 10 Host-based containment and eradication
- 11 Network-based containment and eradication
- 12 Identity-based containment and eradication
- 13 Coordination technology
- 14 Any questions?