• Search...

categories: Technology & Innovation

Productivity
Cyber security , malware
SDG 9: Industry, Innovation and Infrastructure

Incident Handling​

Duration: 1 h 25 m / 15 lessons

Level: General

Course Language: Arabic

By the end of this course, you will be able to

  • By the end of this course, you will be able to: Learn about hacking techniques.

  • Dealing with various incidents and holding forensic work and network analysis.

  • Identify malware reverse engineering analysis tools and techniques.

Course details

  • 1 h 25 m/15 lessons
  • Last updated: 27/10/2022
  • Course completion certificate

Course Content

Free lessons

1.

Introduction to Incident Handling and Response

4 Minutes
2.

Incident Response (IR) & Security Operations Center (SOC) 1

7 Minutes
1.

Introduction to Incident Handling and Response

4 Minutes
2.

Incident Response (IR) & Security Operations Center (SOC) 1

7 Minutes
3.

Incident Response (IR) & Security Operations Center (SOC) 2

3 Minutes
4.

Incident Response (IR) & Security Operations Center (SOC) 3

4 Minutes
5.

How to Deal With and Respond to Incident

5 Minutes
6.

Incident Handling and Response: Kill Chain Model 1

3 Minutes
7.

Incident Handling and Response: Kill Chain Model 2

7 Minutes
8.

Incident Handling and Response: Kill Chain Model 3

4 Minutes
9.

Control Reversals and Working with the Red Team 1

2 Minutes
10.

Control Reversals and Working with the Red Team 2

6 Minutes
11.

Incident Handling Planning

6 Minutes
12.

Incident Response (IR) Models 1

4 Minutes
13.

Incident Response (IR) Models 2

8 Minutes
14.

Incident Response Models: Playbook Use Case

8 Minutes
15.

Comprehensive Exercise

7 Minutes

About this course

In this track, you will learn the cybersecurity fundamentals, the basics of networking, the fields of cybersecurity, basic concepts of cybersecurity, how to create security objects, implement security services, and identify and assess different types of risks. You will also learn about cybersecurity controls, the concept of ethical hacking, infrastructure services, and secure infrastructure engineering. Also, through this track, you will learn about hacking techniques, how to handle and respond to various incidents, and malware reverse engineering techniques.

Course requirements and prerequisites

Graduate from Engineering or Computer Science

Strong problem solving skills

Detailed oriented

Mentor

Looking for help?