Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Performing Incident Response and Handling

via Pluralsight


You’ll explore and investigate into the countless aspects of incident response and how you can plan and design a process for responding to that breach that is coming sooner or later to your organization. Start taking this beginners course today and start learning from Pluralsight!

It’s not a matter of “if”, but rather “when” an attack is going to happen. No matter what you know or do, the hard truth is there's no guaranteed way to stop an attacker from penetrating your organization. Once you’ve accepted that an attack will be unavoidable, your job now becomes "How do I respond to these situations?". This is where the role of an "Incident Responder" comes into play. What do you do when a system or device has been targeted? Well, that depends on the incident itself. In this course, Performing Incident Response and Handling, you'll start by making sure that you and your organization are prepared by learning about each of the security policies that you should have in place to clarify and focus everyone on the importance of keeping your resources secure. First, you'll learn about the actual process of detecting incidents and how to respond to them. Next, you'll explore the actual workflow steps that every security professional should follow to make sure you are consistent with all incidents that are currently affecting you as well as future ones. Finally, you'll dive into some of the more common incidents that take place in your networks by looking at how to handle and respond to issues like a DoS, a Session Hijack, or even Malicious Code. By the end of this course, you'll understand what is needed to help keep your network more secure by being more proactive and aware of what's happening in your environment.

  • Course Overview
  • Preparing for Incident Response and Handling
  • Incident Response Processes
  • The Workflow of Incident Response
  • Networks and Host Attacks
  • Service and Application Attacks
  • Malicious Code and Insider Threats

Taught by

Dale Meredith

Related Courses


Start your review of Performing Incident Response and Handling

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free