
Security Management
Course Overview Assessing Information Security Risk The Importance of Risk Management, Integrating Documentation into Risk Management (Part 1), Integrating Documentation into Risk Management (Part 2) Responding to Cybersecurity Incidents Deploy an Incident Handling and Response Architecture (Part 1), Deploy an Incident Handling and Response Architecture (Part 2), Deploy an Incident Handling and Response Architecture (Part 3), Contain and Mitigate Incidents (Part 1), Contain and Mitigate Incidents (Part 2),Prepare for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Apply a Forensic Investigation (Part 1), Apply a Forensic Investigation (Part 2), Securely Collect and Analyze Electronic Evidence, Follow Up on the Results of an Investigation, Complying With State, Federal and National Legislation Objectives Real-world training is critical to cybersecurity success. With DiTech Solutions Battle Paths, you ll have access to training resources designed to develop skills demanded in the workplace.Access a cloud-based cyber range, with real IT infrastructure, real security tools, and real threats. Work through hands-on training exercises and challenges as you upskill on a variety of cybersecurity concepts. Once you ve finished your journey, you ll earn a DiTech Solutions Badge to share your achievements with your network.Whether you re just getting started in cybersecurity or are looking to build new skills,DiTech Solutions can take your career to the next level. Platform Features Train in virtual environments to see tools and concepts in action Develop skills with hands-on modules built by cybersecurity experts> Test and validate your capabilities against real threats Set goals, track progress, and train on-demand,at your own pace