Certified incident handler (ECIH) v2:
The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to pos...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2024
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781835883006/?ar |
Zusammenfassung: | The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed January 31, 2024) |
Umfang: | 1 Online-Ressource (1 video file (19 hr., 34 min.)) sound, color. |
ISBN: | 9781835883006 1835883001 |
Internformat
MARC
LEADER | 00000ngm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100859658 | ||
003 | DE-627-1 | ||
005 | 20240227122213.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240227s2024 xx ||| |o o ||eng c | ||
020 | |a 9781835883006 |c electronic video |9 978-1-83588-300-6 | ||
020 | |a 1835883001 |c electronic video |9 1-83588-300-1 | ||
035 | |a (DE-627-1)100859658 | ||
035 | |a (DE-599)KEP100859658 | ||
035 | |a (ORHE)9781835883006 | ||
035 | |a (DE-627-1)100859658 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240131 | |
245 | 1 | 0 | |a Certified incident handler (ECIH) v2 |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (19 hr., 34 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 31, 2024) | ||
520 | |a The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. | ||
650 | 0 | |a Computer networks |v Study guides |x Security measures |x Examinations | |
650 | 0 | |a Computer security |v Study guides |x Examinations | |
650 | 0 | |a Electronic data processing personnel |v Study guides |x Certification | |
650 | 0 | |a Computer networks |x Access control | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Sécurité informatique ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Gordon, Adam |e MitwirkendeR |4 ctb | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835883006/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-100859658 |
---|---|
_version_ | 1821494934687973376 |
adam_text | |
any_adam_object | |
author2 | Gordon, Adam Lowrie, Daniel |
author2_role | ctb ctb |
author2_variant | a g ag d l dl |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Gordon, Adam Lowrie, Daniel ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100859658 (DE-599)KEP100859658 (ORHE)9781835883006 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04796ngm a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-100859658</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122213.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835883006</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-300-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835883001</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-300-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100859658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835883006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859658</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240131</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Certified incident handler (ECIH) v2</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (19 hr., 34 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Study guides</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel</subfield><subfield code="v">Study guides</subfield><subfield code="x">Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gordon, Adam</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835883006/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100859658 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:16Z |
institution | BVB |
isbn | 9781835883006 1835883001 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (19 hr., 34 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | Certified incident handler (ECIH) v2 [First edition]. [Place of publication not identified] Packt Publishing 2024 1 Online-Ressource (1 video file (19 hr., 34 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 31, 2024) The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Computer networks Study guides Security measures Examinations Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Computer networks Access control Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Gordon, Adam MitwirkendeR ctb Lowrie, Daniel MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | Certified incident handler (ECIH) v2 Computer networks Study guides Security measures Examinations Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Computer networks Access control Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Certified incident handler (ECIH) v2 |
title_auth | Certified incident handler (ECIH) v2 |
title_exact_search | Certified incident handler (ECIH) v2 |
title_full | Certified incident handler (ECIH) v2 |
title_fullStr | Certified incident handler (ECIH) v2 |
title_full_unstemmed | Certified incident handler (ECIH) v2 |
title_short | Certified incident handler (ECIH) v2 |
title_sort | certified incident handler ecih v2 |
topic | Computer networks Study guides Security measures Examinations Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Computer networks Access control Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer networks Study guides Security measures Examinations Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Computer networks Access control Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT gordonadam certifiedincidenthandlerecihv2 AT lowriedaniel certifiedincidenthandlerecihv2 AT acilearningfirm certifiedincidenthandlerecihv2 AT packtpublishing certifiedincidenthandlerecihv2 |