This course covers everything you need to know about becoming a Certified Incident Handling Engineer. Participants will learn about threats, vulnerabilities, and exploits, IH preparation, request trackers for incident handling, preliminary responses, identification and initial responses, sysinternals, containment, eradication, follow-up, recovery, virtualization security, and malware incident handling.
|Threats, Vulnerabilities, and Exploits||48m|
|Request Tracker for Incident Handling||12m|
|IT Recovery Strategies||30m|
|Identification and Initial Response||12m|
|Malware Incident Handling||1hr 14m|