Course Includes:
- Price: FREE
- Enrolled: 29041 students
- Language: English
- Certificate: Yes
In this course, we will explore various strategies for preventing and responding to IT security incidents, such as ransomware attacks, on your organization's network. The course topics include:
An explanation of the key differences between malware analysis and incident response.
An overview of different malware types, including viruses, worms, fileless malware, and trojans.
Techniques for analyzing known malware, including online file analysis and tools for examining running processes.
Strategies for identifying unknown malware using heuristic activity detection and vulnerability analysis.
Methods for preventing incidents, such as securing removable storage and utilizing email filtering and analysis tools.
Effective incident response methods, including escalation procedures and setting service priorities.
In the real world, protecting against and reacting to security incidents varies for each organization, depending on its size and service priorities. For instance, a company that hosts internal websites may prioritize restoring these services before addressing internal staff issues, or vice versa.
It is crucial to ensure that any changes to your organization’s network align with company policies. This approach guarantees that incidents are resolved smoothly, minimizing downtime and inconvenience to end users. By the end of this course, you will have a solid understanding of both proactive and reactive measures to enhance your organization’s IT security posture.
Join us to gain the essential skills needed to safeguard your network and respond effectively to security threats.
Learn the advantages of on-premise, cloud computing & hybrid cloud infrastructure solutions in this 30 min course!
Learn the basic fundamentals of computer networking & OSI model for desktop support and IT service desk technicians
Learn the processes and considerations involved in new site deployments and migrations of newly acquired IT environments
Learn cyber security best practice tips - securing computer networks from internal/external IT cyber security threats
Learn how to install and configure Windows Deployment Services and how to use the DISM Command on Windows Server 2019
Learn how to plan and complete an upgrade for your organisation's computer network while ensuring minimal disruption
Learn about the different levels of IT technical support, from service desk to infrastructure / server technical support
Learn how to identify, start, stop, restart and manage key services on Windows 10 as well as their relevant cmd commands
Learn some of the less common IT troubleshooting techniques in a technical support environment for Windows computers
Learn the basics of information / cybersecurity - what you need to know to be compliant with data protection regulations
Learn how to troubleshoot desktop computer issues as an IT Support Technician on real-world organisational networks.
Learn how to setup Nagios and configure Nagios XI monitoring for core services on your organisation's network
Server infrastructure fundamentals - everything you need to know!
Job Search Preparation / Career Coaching : Maximizing Social Media, LinkedIn Strategies, Interview Techniques, CV Tips
Podstawowe umiejętności: Znajomość Active Directory i zarządzania zasadami grupy
Build a real example web application from scratch with PHP 8 and MySQL
The foundation for starting a robust React app!
Build from scratch a clean PHP 8 backend API based on scalable and powerful N-Tier architecture