Udemy - ISO - IEC 27035 - 2023 - Incident Management Step by Step
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size737.8 MB
- Uploaded Byfreecoursewb
- Downloads34
- Last checkedMay. 09th '25
- Date uploadedMay. 08th '25
- Seeders 5
- Leechers10
Infohash : 023ECD3721E04DA0BA36248985F7D6FBE4830083
ISO/IEC 27035:2023 - Incident Management Step by Step
https://WebToolTip.com
Published 5/2025
Created by Dr. Amar Massoud
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 26 Lectures ( 2h 25m ) | Size: 738 MB
Master ISO 27035 incident response lifecycle—detection, analysis, containment, recovery, continual improvement
What you'll learn
Implement the full ISO/IEC 27035:2023 incident-management lifecycle.
Create incident response policies, roles, and escalation paths.
Detect, analyze, and contain security incidents step by step.
Run post-incident reviews and drive continual improvement.
Requirements
Basic knowledge of information-security concepts is helpful but not required.
Files:
[ WebToolTip.com ] Udemy - ISO - IEC 27035 - 2023 - Incident Management Step by Step- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Introduction
- 1 -Introduction.mp4 (51.5 MB)
- 2 -Introduction To ISO-IEC 27035 - 2023 (1).mp4 (35.4 MB)
- 3 -Introduction To ISO-IEC 27035 - 2023 (2).mp4 (23.9 MB)
- 4 -Our Use Case - CyberShield Technologies.mp4 (16.9 MB)
- 1 -Conclusion.mp4 (16.7 MB)
- 1 -Step 1 - Planning & Preparing For Incident Management (1).mp4 (44.2 MB)
- 2 -Step 1 - Planning & Preparing For Incident Management (2).mp4 (49.3 MB)
- 1 -Step 2 - Identifying & Reporting Security Incidents (1).mp4 (32.3 MB)
- 2 -Step 2 - Identifying & Reporting Security Incidents (2).mp4 (35.4 MB)
- 3 - Hands-On Exercise Simulating Incident Identification.html (7.6 KB)
- 1 -Step 3 - Incident Assessment & Prioritization (1).mp4 (34.5 MB)
- 2 -Step 3 - Incident Assessment & Prioritization (2).mp4 (29.5 MB)
- 3 - Case Study Assessing A Real Cyber Incident.html (2.7 KB)
- 1 -Step 4 - Incident Response & Containment (1).mp4 (43.8 MB)
- 2 -Step 4 - Incident Response & Containment (2).mp4 (34.4 MB)
- 3 - Hands-On Exercise Incident Containment Strategies.html (3.6 KB)
- 1 -Step 5 - Eradication & Recovery Procedures (1).mp4 (35.2 MB)
- 2 -Step 5 - Eradication & Recovery Procedures (2).mp4 (33.9 MB)
- 3 - Case Study Post-Incident Recovery Implementation.html (4.1 KB)
- 1 -Step 6 - Incident Communication & Stakeholder Management (1).mp4 (53.0 MB)
- 2 -Step 6 - Incident Communication & Stakeholder Management (2).mp4 (27.4 MB)
- 1 -Step 7 - Post-Incident Analysis & Continuous Improvement (1).mp4 (42.5 MB)
- 2 -Step 7 - Post-Incident Analysis & Continuous Improvement (2).mp4 (31.1 MB)
- 3 - Hands-On Exercise Creating an Incident Post-Mortem Report.html (7.8 KB)
- 1 -Step 8 - Coordinated Incident Response Across Organizations.mp4 (66.8 MB)
- 2 - Case Study Coordinated Response To A Large-Scale Breach.html (4.9 KB)
- Bonus Resources.txt (0.1 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce