
Security Management
Course Overview Assessing Information Security Risk The Importance of Risk Management, Integrating Documentation into Risk Management (Part 1), Integrating Documentation into Risk Management (Part 2) Responding to Cybersecurity Incidents Deploy an Incident Handling and Response Architecture (Part 1), Deploy an Incident Handling and Response Architecture (Part 2), Deploy an Incident Handling and Response Architecture (Part 3), Contain and Mitigate Incidents (Part 1), Contain and Mitigate Incidents (Part 2),Prepare for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Apply a Forensic Investigation (Part 1), Apply a Forensic Investigation (Part 2), Securely Collect and Analyze Electronic Evidence, Follow Up on the Results of an Investigation, Complying With State, Federal and National Legislation Objectives Real-world training is critical to cybersecurity success. With DiTech Solutions Battle Paths, you ll have access to training resources designed to develop skil