Home / Course catalog / Build Security Incident Response for GDP... (GDPR3)


Build Security Incident Response for GDPR Data Protection (GDPR3)

In this course you will learn what Security Incident Response is and how it relates to GDPR Data Privacy, and if you are used to my style, you will do it from 3 perspective: theory, processes and technology.   

You will be able to apply our security methodologies, security frameworks and security processes for your own environment.

The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand Security Incident Response challenges, difference between a NOC and a SOC (Security Operation Center) and how the latest can help in defining the Security Incident Response Process.  We will follow up with GDPR Data Protection & Privacy relation and the impact of GDPR to Security Incident Response for any organization. We will learn about methodologies, frameworks, playbooks, we will draft 2 procedures and we will see how technology can help us in the roadmap.   

And all of these are separate resources that you will get!   

In the end, I will give an incredible collection of incident response free tools and resources I have build during time and i will teach how malware works, especially in the financial market.   

The course is delivered in a mix of over the shoulder lessons and powerpoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey.   

I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.   

As a student of this course, you will also get regular updates and access to new additional lectures as they are added.

Continue To Order: https://ethicalhackersacademy.com/collec...

  • 0_INTRO_incident-response-for-gdpr sample
  • 1.1_Welcome _ Intro
  • 1.2_Set your expectations
  • 2.1_ What is Incident Response and why do I need it
  • 2.2_ Incident Response Team
  • 2.3_Incident Response Process and Procedures
  • 2.4_Types of Security Incidents
  • 2.5_Incident Response Tools - general
  • 2.6_What is a SIEM
  • 2.7_Incident Response Training
  • 2.8_What is automation in incident response
  • 3.1_What is a NOC
  • 3.2_What is a SOC
  • 3.3_ Integrated NOC and SOC
  • 3.4_Mission_ Team and Required Training
  • 3.5_ Types of SOC
  • 3.6_Building a SOC
  • 3.7_Cheat Sheets to help you in configuring your systems
  • 4.1 GDPR intro
  • 4.2_GDPR effects on Incident Response
  • 4.3_ How to create an effective Incident Response plan
  • 4.4_GDPR Incident Response Process
  • 4.5_ Lets draft the IRM Procedure
  • 4.6_How to treat data breaches
  • 5.1_ IRM1 - Worm Infection
  • 5.2_ IRM2 - Windows Intrusion
  • 5.3_IRM3 - Unix_Linux Intrusion Detection
  • 5.4_IRM4 - DDoS
  • 5.5_ IRM5 - Malicious Network Behavior
  • 5.6_ IRM6 - Website Defacement
  • 5.7_ IRM7 - Windows malware detection
  • 5.8_IRM8 - Blackmail
  • 5.9_ IRM9 - SmartphoneMalware
  • 5.10_IRM10 - Social Engineering
  • 5.11_ IRM11 - Information Leakage
  • 5.12_ IRM12 - Insider Abuse
  • 5.13_IRM13 - Phishing
  • 5.14_IRM14 - Scam
  • 5.15_ IRM15 - Ransomware
  • 6.1_Lessons learned by working in a SOC
  • 6.2_A list of open source tools to use
  • 6.3 ATP Incident Response
  • 7.1_Final thoughts and other documents
Completion rules
  • All units must be completed