starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Incident Response and Handling for Cyber Security Professionals

Incident Response and Handling for Cyber Security Professionals

This course covers the six phases of incident handling and responding to help you become a professional cybersecurity incident handling team member or team leader

Mohammad Adly
Mohammad Adly
Cybersecurity | core | 1 hour |   Published: Nov 2021

    Discussions

Overview

1.3KSTUDENTS*
94%RECOMMEND*

This course includes:

  • 1+ hours of on-demand video
  • 7 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others 

Skills You Will Gain

Cybersecuirty
IT Managers

Learning Outcomes (At the end of this program you will be able to)

  • Handle and respond to cybersecurity incidents in your organization 

 

Prerequisites

  • None 

 

Who Should Attend

  • Cyber security professionals 
  • Software developers 
  •  IT managers 

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Welcome to the course!
2Module 01: Course Introduction
3Module 02: Preparation
4Module 03: Identification
5Module 04: Containment
6Module 05: Eradication
7Module 06: Recovery
8Module 07: Course Conclusion

Segment - 01 - Introduction

Segment - 02 - Preparation of People and Policy

Segment - 03 - Team Building and Management

About this course: Overview, Learning Outcomes, Who Should Enroll...

Segment - 08 - Restoring and Improving Defenses

Segment - 06 - Deployment and Categorization

Segment - 07 - Short-term and Long-term Actions

Segment - 04 - Where Does Identification Occur?

Segment - 05 - What to Check?

Segment - 10 - Meet, Fix, and Share

Segment - 09 - Validation and Monitoring

Mohammad Adly

Mohammad Adly

Mohammad Adly is a distinguished expert in computer engineering and electronic sciences, holding a Ph.D. focused on enhancing congestion control mechanisms for internet media traffic. His doctoral research at Menoufiya University introduced advanced methodologies aimed at optimizing network performance for media applications, making significant contributions to the field of network traffic management. He also earned an M.Sc. from the same institution, where his thesis centered on video services for remote work within IP environments, showcasing his deep expertise in video communication technologies.

His strong academic foundation in computer networks was further reinforced through an Information Technology Diploma from the Information Technology Institute (ITI), followed by research experience at the IRISA Institute, Rennes I University in France. There, he explored innovative solutions in network security and performance, gaining valuable international research exposure.

Mohammad holds several prestigious certifications, including the Lean Six Sigma Green Belt and multiple GIAC security certifications. He has contributed extensively to the academic community through numerous publications covering topics such as TCP-friendly rate control, media traffic congestion control, and adaptive video streaming systems. His work has been featured in leading journals and international conferences, reflecting his dedication to advancing technology and its real-world applications.

VIEW MY CHANNEL