Foundational training in cyber incident response methodologies and procedures
Foundational training in cyber incident response methodologies, playbooks, and procedures. Covers preparation, detection, analysis, containment, eradication, and recovery.
Includes tabletop exercises simulating ransomware, data breaches, and insider threats based on real incidents. Available in both technical and executive tracks.
Hands-on technical training for security analysts and incident responders. Deep dive into tools, techniques, and procedures for investigating and responding to cyber incidents.
Request Info →Strategic overview for executives and leadership. Focus on decision-making, resource allocation, and communication during incidents. Includes tabletop exercises.
Request Info →Real-world scenarios based on actual incidents
Respond to a ransomware attack affecting critical systems. Practice containment, communication, and recovery procedures.
Investigate a suspected data breach, determine scope, and implement containment measures.
Respond to an insider threat scenario, balancing security needs with operational requirements.
Address a supply chain compromise affecting multiple systems and vendors.
Request a syllabus or schedule a discovery call to learn more about this course.