Ready for - Nearly Anything - Preparing Your Organisation for a Cyber Incident

Ready for - Nearly Anything - Preparing Your Organisation for a Cyber Incident

Security BSides London via YouTube Direct link

Host-based containment and eradication

10 of 14

10 of 14

Host-based containment and eradication

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Ready for - Nearly Anything - Preparing Your Organisation for a Cyber Incident

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Let's talk about cyber incidents
  3. 3 Five things to prepare for a cyber incident
  4. 4 Key processes for an incident response team
  5. 5 The hierarchy of incident response processes
  6. 6 Resourcing an incident response function
  7. 7 Roles required for incident response
  8. 8 What logs to store?
  9. 9 How long to store logs for?
  10. 10 Host-based containment and eradication
  11. 11 Network-based containment and eradication
  12. 12 Identity-based containment and eradication
  13. 13 Coordination technology
  14. 14 Any questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.