Cyber Incident Management and First Responses

Cyber Incident Management and First Responses

Cyber Incident Management and First Responses

Cyberattacks have a rapid disruptive capability, with potentially serious consequences. Therefore, they must be managed early and effectively. This training allows IT teams and SOC analysts to acquire an incident management methodology, familiarize themselves with detection and learning tools, and practice realistic simulations to formulate a better response at the time of an incident.

Programme

Programme

Day 1 - Identification and management of cyber incidents


Morning – 9 AM to 12:30 PM


Introduction to Security Incident Management  

• Definition and classification of cyber incidents. 

• Lifecycle of a cybersecurity incident. 

• Examples of recent attacks and impacts on businesses. 

 

Methodology and Tools for Incident Detection 

• Monitoring tools and anomaly detection (SIEM, EDR, IDS/IPS). 

• Roles and responsibilities of teams in charge of responding to incidents. 

• Identification of log sources and preliminary analysis. 



Afternoon – 1:30 PM to 5 PM


Incident Response Procedures 

• Steps for containment, eradication, and recovery. 

• Coordination with internal and external stakeholders (ANSSI, CERT). 

• Best practices for documenting and escalating an incident. 

 

Case Studies and Hands-on Exercises 

• Case study of a ransomware attack and adequate response. 

• Exercise for detecting an incident in real logs. 




Day 2 - Incident Simulation and Crisis Management Plan   


Morning – 9 AM to 12:30 PM


Introduction to Security Incident Management 

• Real-time incident management exercise. 

• Cyberattack simulation with participants taking the lead. 

• Implementation of containment and eradication procedures. 

 

Post-Mortem Analysis and Feedback 

• Identification of errors and areas for improvement. 

• Writing an incident report and action plan. 



Afternoon – 1:30 PM to 5 PM


Development of a Cyber Crisis Management Plan 

• Definition of roles and responsibilities. 

• Internal communication and with external partners. 

 

Lessons Learned and Best Practices 

• Summary of acquired knowledge. 

• Best practices and continuous improvement plan. 

General information

General information

4,500 € before tax

Objectif

Training teams to detect a cyber incident and respond effectively

Public cible

IT teams, SOC, system administrators

Niveau

Intermediate / Advanced

Durée

Two (2) days

This training is offered in partnership with Académie Cyber, an accredited organization. It is Qualiopi certified and eligible for CPF.

Other training offered by De Shagan Network

Other trainings offered by De Shagan Network 

Application security and DevSecOps

A simple bug can be an entry point for a cyberattack. Make sure your developers implement the best practices from the OWASP Top 10.

Target

Target

- Developers, DevOps, IT teams

- Developers, DevOps, IT teams

Developers, DevOps, IT teams

Level

Level

- Intermediate / Advanced

- Intermediate / Advanced

Intermediate / Advanced

Duration

Duration

- Two (2) days

- Two (2) days

Two (2) days

Cloud environment security (AWS, Azure, Google Cloud)

Cloud solutions (AWS, Azure, Google Cloud…) open the door to many cyber risks. Protect your business from data leaks or attacks on APIs. 

Target

Target

- IT teams, cloud architects, DevOps

- IT teams, cloud architects, DevOps

IT teams, cloud architects, DevOps

Level

Level

- Intermediate

- Intermediate

Intermediate

Duration

Duration

- One (1) day

- One (1) day

One (1) day

De Shagan Network

SMEs, midsize companies, and large accounts, protect yourselves effectively against cyberattacks.

Our locations

Follow us!

Find our news updates on

© 2024 De Shagan Network. All rights reserved.

De Shagan Network

SMEs, midsize companies, and large accounts, protect yourselves effectively against cyberattacks.

Follow us!

Find our news updates on

Our locations

© 2024 De Shagan Network. All rights reserved.

De Shagan Network

SMEs, midsize companies, and large accounts, protect yourselves effectively against cyberattacks.

Our locations

Follow us!

Find our news updates on

© 2024 De Shagan Network. All rights reserved.