Certified Incident Investigations and Response Manager ( C-IIRM)

As organizations continue to rely on expanding infrastructure in an increasingly hostile threat landscape, the escalation of incidents involving malicious actors poses critical risks to information systems and networks. The ability to identify threats, respond to incidents, restore systems, and enhance security postures is vital to the survival of the operation. The Incident Investigations and Response Manager certification course brings Incident Response core competencies to advanced levels by presenting students with 14 detailed chapters designed to align with a variety of training schedules.

Students will be provided with the knowledge and the practical skills needed to investigate and respond to network and system incidents. With a specific focus on the identification and remediation of incidents involving host and network devices, students will cover topics such as The Incident Response Life Cycle, Indicators of Compromise, Investigative Techniques, Threat Intelligence Collection, and Remediation Strategies. The content of this course is aligned for use with immersive cybersecurity labs produced by Jones & Bartlett Learning, Pearson Education, and Cengage.

A minimum of 12 months of work experience or equivalent study in the Information Security field is suggested. Students should have knowledge of basic networking and TCP/IP protocols.

 

Certification Course Outline

* What Constitutes an Incident?
* Technology as a Landscape for Crime
* The Incident Response Life Cycle
* What is Incident Response?
* 7 Stages of the Attack Life Cycle
* 10 Steps to Help Reduce Incidents
* Cyber Adversaries vs. Cyber Defenders
* Nation State vs. Non-Nation State Actors
* Components of the Threat Landscape
* Legal Challenges in Digital Investigations
* Challenges to Cyber Crime Investigations
* International Enforcement Challenges
* Defining the Incident Response Mission
* Internal Communication Procedures
* External Communication Procedures
* Incident Response Team Deliverables
* Building a Field Forensic System
* Preparing the Infrastructure
* Collecting Initial Facts
* Incident, Network, and Malware Checklists
* Building an Attack Timeline
* Incident Scene Management
* Elements of Proof and Chain of Custody
* Investigative Interview Strategies
* Vulnerability Program Essentials
* Prioritizing Vulnerability and Risk
* Rating Vulnerability Levels
* Analyzing a Vulnerability Notification
* Establishing an Efficient Workflow
* Vulnerability Scanning Software
* Baseline Measuring Objectives
* Identifying Usage Patterns
* Network Sensor Deployment
* Statistical Monitoring
* Header and Full Packet Logging
* Network Monitoring Evaluation
* Potential Signs of Compromise
* The Case for Network Monitoring
* Turning Leads into Indicators
* The Life Cycle of Indicator Generation
* Indicator of Compromise Verification
* Event-Based Alert Monitoring
* Understanding the Maneuver Warfare Mindset
* The Threat Intelligence Cycle
* Intelligence Collection
* Analysis and Production
* Dissemination of Intelligence
* Threat Intelligence Sources
* Network Forensics vs. Digital Forensics
* General Process for Performing Analysis
* Available Data Sources
* Outlining the Analysis Approach
* Selection of Analysis Methods
* Evaluating Analysis Results
* Responsibilities of The First Responder
* The Host Device Power State
* The Windows Directory Structure
* Locating Endpoint Data
* The Windows Registry
* The Importance of IoT Devices
* When to Perform a Live Response
* Live Response Challenges
* Selecting a Live Response Tool
* Data Collection Considerations
* Common Live Response Data
* Collection Best Practices
* Malware Triage Concepts
* Malware Handling Procedures
* Malware Distribution and Documentation
* Assessing Malicious Websites
* Introduction to Static and Dynamic Analysis
* Automated Analysis: Sandboxes
* Effective Incident Remediation
* Assigning a Remediation Owner
* Remediation Posturing Actions
* Eradication Plan Development
* Plan Timing and Execution
* Developing Strategic Recommendations
* Report Style and Formatting
* Report Content and Organization
* Documenting Lessons Learned
* Response Playbook Components
* Building a Response Playbook
* Planning Table-Top and Simulated Exercises

Testimonials

Shouq Aldhaheri

This course offered a lot of valuable information on a high level and focused in on the realities that cybersecurity professionals are facing right now in 2022. It’s not a generic course that focuses on general information only and I think that’s the key difference between this course and others that I’ve experienced. The course helped me to gain knowledge and connect the dots between what we studied in the course and how my current organization works in the real world. The course made it simple for me to understand incident response procedures and protocols. Click to read more

The British University in Dubai

Block 11, 1st and 2nd floor, Dubai International Academic City PO Box 345015, Dubai, UAE

Tel: +971 4 279 1400

Whatsapp: +971 50 701 2843 and +971 4 279 1400

Email: [email protected]

Our COVID-19 protocols