Incident Response, BC, and DR Concepts

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Incident Response, BC, and DR Concepts

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any organization. After completing this course, the participant will be able to:  Explain how organizations respond to, recover from and continue to operate during unplanned disruptions. - Recall the terms and components of incident response. - Summarize the components of a business continuity plan. - Identify the components of disaster recovery. - Practice the terminology of and review incident response, business continuity and disaster recovery concepts. Agenda Course Introduction Module 1: Incident Response (IR) Module 2: Business Continuity (BC) Module 3: Disaster Recovery (DR) Module 4: Incident Response, Business Continuity, and Disaster Recovery Review This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
Microsoft Reveals Kazuar Malware’s Advanced Modular Design and Peer-to-Peer Botnet Capabilities
Microsoft reveals Kazuar malware's advanced modular design and peer-to-peer botnet capabilities, posing a significant threat to cybersecurity
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
Up next
Cryptography
Coursera
Watch →