We may earn an affiliate commission when you visit our partners.
Course image
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Michael Whitman, Ph.D., CISM, CISSP

Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural and man-made cybersecurity disasters.

Read more

Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural and man-made cybersecurity disasters.

In this course, a learner will be able to:

● Define and describe the components of a cybersecurity contingency planning program

● Identify the components and structure of an effective cybersecurity incident response program

● Identify the components and structure of an effective cybersecurity disaster recovery program

● Define and describe recommended contingency strategies including data backup and recovery and continuity of cybersecurity operations.

Enroll now

What's inside

Syllabus

Welcome to Managing Cybersecurity Incidents and Disasters (Course 4)
Course learning objectives for Managing Cybersecurity Incidents and Disasters
Read more
Introduction to Contingency Planning (Module 4.1)
Learning objectives for Introduction to Contingency Planning
Incident Response (Module 4.2)
Learning objectives for the module Incident Response
Disaster Recovery (Module 4.3)
Learning objectives for Disaster Recovery
Business Continuity (Module 4.4)
Learning objectives for Business Continuity
Course Wrap Up for Managing Cybersecurity Incidents and Disasters

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for beginners and strengthens an existing foudnation for intermediate learners
Provides a comprehensive study of science, math, and technology
Examines highly relevant cybersecurity incidents and disasters
Offers hands-on labs and interacive materials
Develops professional skills or deep expertise in cybersecurity planning
Taught by instructors recognized for their work in cybersecurity

Save this course

Save Managing Cybersecurity Incidents and Disasters to your list so you can find it easily later:
Save

Reviews summary

Well-regarded cybersecurity incident management

Learners say this highly recommended course is well-suited for those in cybersecurity and IT who want to build skills in business continuity, incident response planning, and disaster recovery. Students largely positive about this course describe the course content as engaging. They mention difficulty with a few incorrect questions and some boring instruction. Despite these issues, learners say they love this well-presented course that is relevant and useful for their careers.
Learners find the content informative and useful.
"It seems to be a lot of terms and memorising those terms."
"This course teaches about Business Continuity, Cybersecurity Incidents Response Planning and Disasters Recovery Planning."
"There were lots of in-depth explanation of the types of incidents that could occur."
Learners say instructors thoroughly explain concepts.
"The course and instructor laid out the information in a clear way which enable retention of the information"
"A very big thank you to the course instructors, for thoroughly explaining all the concepts and every aspect of the module"
Some learners describe the instruction in the course as boring.
"I found the instruction boring"
A few learners mention difficulty with some incorrect questions.
"It would be 5 stars if the questions at the end didn't mark some questions incorrectly"

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Managing Cybersecurity Incidents and Disasters with these activities:
Review contingency planning concepts
Reinforce your understanding of contingency planning basics to prepare for the course.
Browse courses on Contingency Planning
Show steps
  • Review definitions and components of contingency planning
  • Identify different types of contingency plans
  • Practice developing a simple contingency plan
Read the course syllabus and skim the textbook
Reinforces the structure and contents of the course.
Show steps
  • Gather course materials, including the syllabus, textbook, and any other relevant documents.
  • Review the course syllabus to understand the course objectives, schedule, and grading criteria.
  • Skim the textbook to get an overview of the major concepts that will be covered in the course.
Read 'Incident Response and Disaster Recovery Planning for IT Professionals' by Michael Whitman and Herbert Mattord
Provides a comprehensive overview of incident response and disaster recovery planning.
Show steps
  • Purchase or borrow a copy of the book.
  • Read the book thoroughly, taking notes as you go.
  • Complete the review questions at the end of each chapter.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Develop a cybersecurity incident response plan
Applies knowledge of incident response to a practical scenario.
Show steps
  • Identify the potential cybersecurity threats and risks that your organization faces.
  • Develop a step-by-step plan for responding to cybersecurity incidents.
  • Test your incident response plan to identify any weaknesses or areas for improvement.
Participate in cybersecurity incident response simulations
Provides hands-on experience in responding to cybersecurity incidents.
Show steps
  • Find cybersecurity incident response simulations online or through professional organizations.
  • Participate in simulations to test your incident response skills.
  • Review your performance and identify areas for improvement.
Attend a cybersecurity incident response workshop
Offers opportunities to learn from experts and network with other professionals.
Show steps
  • Research cybersecurity incident response workshops in your area.
  • Register for a workshop that fits your schedule and interests.
  • Attend the workshop and actively participate in the activities.
Find a mentor who is experienced in cybersecurity incident response
Provides access to guidance and support from an experienced professional.
Show steps
  • Identify potential mentors through professional organizations, networking events, or online forums.
  • Reach out to potential mentors and express your interest in their mentorship.
  • Set up regular meetings with your mentor to discuss your progress and get feedback.
Create a cybersecurity incident response resource kit
Provides a centralized and organized collection of resources for incident response.
Show steps
  • Gather relevant resources from websites, books, and other sources.
  • Organize the resources into categories such as tools, templates, and best practices.
  • Create a central repository for the resources, such as a shared drive or online platform.
Volunteer with a cybersecurity incident response team
Provides practical experience and opportunities to contribute to the community.
Show steps
  • Identify cybersecurity incident response teams in your area that accept volunteers.
  • Apply to volunteer with the team and complete any required training.
  • Participate in incident response activities under the guidance of experienced professionals.

Career center

Learners who complete Managing Cybersecurity Incidents and Disasters will develop knowledge and skills that may be useful to these careers:
IT Security Auditor
An IT Security Auditor is responsible for assessing the security of an organization's computer systems and networks. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different techniques that auditors use to identify and assess vulnerabilities in an organization's security posture.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different security standards and frameworks that organizations use to assess and improve their security posture.
Cybersecurity Specialist
A Cybersecurity Specialist works to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different strategies that organizations can use to protect their data and systems from cybersecurity threats.
Penetration Tester
A Penetration Tester is responsible for identifying and exploiting vulnerabilities in an organization's computer systems and networks. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different techniques that penetration testers use to identify and exploit vulnerabilities.
IT Risk Manager
An IT Risk Manager is responsible for identifying, assessing, and mitigating the risks associated with an organization's use of information technology. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different risk management frameworks and methodologies that are used to assess and mitigate risks.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for leading an organization's cybersecurity program. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different leadership and management techniques that are used to lead cybersecurity programs.
Cybersecurity Manager
A Cybersecurity Manager is responsible for overseeing an organization's cybersecurity program. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different management techniques and tools that are used to manage cybersecurity programs.
Information Security Analyst
An Information Security Analyst helps an organization analyze its security needs, implement security measures, and respond to security incidents. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different strategies that organizations can use to protect their data and systems from cybersecurity threats, which is crucial for any Information Security Analyst.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains an organization's network security infrastructure. This course can help you to develop the skills and knowledge you need to be successful in this role by providing you with a foundation in cybersecurity contingency planning, incident response, and disaster recovery. You will also learn about the different technologies and protocols that are used to secure networks and the different threats that organizations face.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. This course may be useful for Software Engineers who work in the cybersecurity field, as it can help them to develop the skills and knowledge they need to design and develop software applications for cybersecurity incidents and disasters.
Vulnerability Manager
A Vulnerability Manager is responsible for identifying, assessing, and mitigating vulnerabilities in an organization's computer systems and networks. This course may be useful for Vulnerability Managers who work in the cybersecurity field, as it can help them to develop the skills and knowledge they need to identify, assess, and mitigate vulnerabilities in cybersecurity incidents and disasters.
Security Architect
A Security Architect designs and implements security solutions for organizations. This course may be useful for Security Architects who work in the cybersecurity field, as it can help them to develop the skills and knowledge they need to design and implement security solutions for cybersecurity incidents and disasters.
Data Scientist
A Data Scientist uses data to solve problems and make decisions. This course may be useful for Data Scientists who work in the cybersecurity field, as it can help them to develop the skills and knowledge they need to analyze and interpret data related to cybersecurity incidents and disasters.
Systems Engineer
A Systems Engineer designs, implements, and maintains computer systems. This course may be useful for Systems Engineers who work in the cybersecurity field, as it can help them to develop the skills and knowledge they need to design and implement computer systems for cybersecurity incidents and disasters.
Forensic Analyst
A Forensic Analyst investigates computer crimes and cyberattacks. This course may be useful for Forensic Analysts who work in the cybersecurity field, as it can help them to develop the skills and knowledge they need to investigate cybersecurity incidents and disasters.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Managing Cybersecurity Incidents and Disasters.
Good choice for a more comprehensive and technical book on incident response than what is covered in the course.
Provides a detailed overview of incident response and disaster recovery. It covers all aspects of incident response, from planning and preparation to investigation and remediation.
This comprehensive guide to the CISSP exam provides a thorough review of the eight domains of information security. It is an essential resource for anyone preparing for the CISSP exam, and it can also serve as a valuable reference for IT professionals.
Provides a comprehensive overview of disaster recovery in the cloud. It covers all aspects of disaster recovery in the cloud, from planning and preparation to implementation and recovery.
Provides a practical guide to disaster recovery planning for IT professionals. It covers all aspects of disaster recovery planning, from planning and preparation to implementation and recovery.
This practical guide to disaster recovery provides IT professionals with a comprehensive overview of the disaster recovery process. It covers the full range of disaster recovery topics, from planning and preparedness to recovery and restoration.
Published by Carnegie-Mellon University, this classic and foundational book on incident response.
This classic book on social engineering provides a unique insight into the human element of security. It must-read for anyone who wants to understand how to protect against social engineering attacks.
This textbook provides a comprehensive overview of cybersecurity from a systems perspective. It covers the full range of cybersecurity topics, from security principles to security technologies.
This textbook provides a detailed overview of security controls for computer systems. It covers the full range of security controls, from physical security to network security.
This textbook provides a comprehensive overview of computer security from a principles and practice perspective. It covers the full range of computer security topics, from security principles to security technologies.
This guide to information security policy provides a step-by-step approach to developing and implementing an information security policy. It covers the full range of policy development topics, from policy creation to policy implementation.
This guide to network security provides a comprehensive overview of the security challenges and solutions in networks. It covers the full range of network security topics, from network security principles to network security technologies.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Managing Cybersecurity Incidents and Disasters.
Road to the CISO – Culminating Project Course
Most relevant
Implementing a Risk Management Framework
Most relevant
The GRC Approach to Managing Cybersecurity
Most relevant
Cybersecurity Job Search and Interviews: Getting Started
Most relevant
The Foundations of Cybersecurity
Most relevant
Cybersecurity Foundations for Risk Management
Most relevant
Foundations of Project Management
Most relevant
Identifying, Monitoring, and Analyzing Risk and Incident...
Certificate in Cybersecurity Analysis (IIBA®-CCA):...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser