Course Provider
What will you learn in Information Security Audits (SKO 0904) course?
After completing this course, one will have sufficient know-how of:
- Building a security infrastructure under the NIST Framework
- Incident Response Policy, Plan, and Procedure Creation
- The security incident report
Information Security Audits (SKO 0904)
-
Skill Type
Emerging Tech
- Domain
Cyber Security
- Course Category
Deepskilling Course
- Certificate Earned Joint Co-Branded Participation Certificate
- Course Covered under GoI Incentive
Yes
-
- Course Price
INR 2,999+ 18% GST
- Course Duration
5 Hours
- Course Price
Why you should take Information Security Audits (SKO 0904) course?
This course will help you to plan for your Security Incident Response, detect threats and learn the best practices.
Who should take Information Security Audits (SKO 0904) course? (50-100 words)
This course is designed for those who want to manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of the incident response efforts.
Curriculum
Course 1
- Module 1
- Introduction
- What is threat modelling?
- Key Takeaways from Cyberattacks
- Cyber Threat modeling
- NIST Cybersecurity Framework
- Prepare for a security incident
- Phases of a major response
- Recovery preparations
- Critical success factors
- Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- List for developing a CSIRT
- Team duties
- Team preparations
- Establishing team roles
- CSIRT communications
- Recovering your systems
- Key Takeaways
- Module 3
- The security incident report
- Practice walking through a security incident report
- Next steps
FAQs
Threat modeling works by identifying the types of threat agents that cause harm to an application or computer system. It adopts the perspective of malicious hackers to see how much damage they could do. When conducting threat modeling, organizations perform a thorough analysis of the software architecture, business context, and other artifacts (e.g., functional specifications, user documentation). This process enables a deeper understanding and discovery of important aspects of the system. Typically, organizations conduct threat modeling during the design stage (but it can occur at other stages) of a new application to help developers find vulnerabilities and become aware of the security implications of their design, code, and configuration decisions.