Security Incident Triage


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore the importance of security incident triage in handling incidents in a timely and automated manner, in this 14-video course, which familiarizes learners with anomalies and activities that often require triage. Key concepts covered in this course include security triage fundamentals and the strategies to implement triage; tools used in security triage; and automation techniques and common tips and rules of thumb for security triage. Next, you will explore the importance of communication and stakeholder management in security triage; examine the approaches to detecting anomalies and handling them with security triage; and learn about common protocol anomalies that require triage. Continue by exploring the different levels of monitoring for incidents in security triage while looking at network monitoring of traffic, bandwidth, and the various protocols used; learn to analyze SSH activity and security events to look for; and learn how to analyze DNS activity, HTTPS activity, and system log activity. Finally, learn how to describe security events to look for in each activity.



Expected Duration (hours)
0.9

Lesson Objectives

Security Incident Triage

  • discover the key concepts covered in this course
  • describe the concepts of security triage and strategies to implement triage
  • describe the tools used in security triage
  • describe automation techniques in security triage
  • describe common tips and rules of thumb for security triage
  • describe the importance of communication and stakeholder management in security triage
  • describe approaches to detecting anomalies and handling them with security triage
  • describe common protocol anomalies that require triage
  • describe monitoring for incidents in security triage
  • analyze SSH activity and describe security events to look for
  • analyze DNS activity and describe security events to look for
  • analyze HTTPS activity and describe security events to look for
  • analyze system log activity and describe security events to look for
  • summarize the key concepts covered in this course
  • Course Number:
    it_sastradj_01_enus

    Expertise Level
    Intermediate