Incident Response Management

Enquiry
Programme CodeD31
Domain
Cybersecurity
Level
Foundation
Learning Partner(s)
Singapore Polytechnic
Singtel Cyber Security Institute
Duration
2 Days
FormatIn-person
Rating
Job Roles
ICT&SS Professional

Overview

Gain cybersecurity skills through hands-on incident-handling exercises. Today, it is crucial for organisations to protect their digital assets and infrastructure. Build your skills and knowledge to be cybersecurity-savvy, so that you can play a part in protecting your organisation's network and systems infrastructure.

While many instructor-led cybersecurity programmes are being offered today, not many are lab-based. To pick up the technical skills in cyber security, it is essential that you have opportunities for hands-on practical sessions.

This programme is practical-based with hands-on examples for you to experience cyber incidents and practice how to handle security incidents based on reported incidents. In the ICT Skills Framework, the programme will cover skills in Incident Response, Forensic Investigation, Threat Analysis (PL4) and Governance Risk and Compliance (PL1). 

Key Takeaways

At the end of this programme, you will be able to:

  • Understand the process and best practices in incident response management
  • Explain the differences between Traditional vs Cloud IRM
  • Identify and mitigate DoS attacks
  • Identify and mitigate malware attacks
  • Identify and mitigate phishing attacks
  • Identify and mitigate web attacks

Who Should Attend

  • Please refer to the job roles section.
  • Security Analysts and Managers.
  • Senior Information Risk Owner (SIRO).
  • Senior Information Risk Manager (SIRM).
  • Members of the incident response team.

Prerequisites

Basic experience and knowledge in networking, system administration and understanding security concepts.

Testimonials

The facilitator provided me with a valuable refresher on cybersecurity incident response management techniques. 

It was useful to learn about the common techniques used in cybersecurity, including the phases of incident response, actual use cases, and related discussions.

It was particularly useful to learn about the different phases of incident response and the appropriate actions to take for each scenario.