Module 5: Evaluating Damage and Mitigating APTs
Techniques for evaluating the extent of damage caused by cyber
Techniques for evaluating the extent of damage caused by cyber
Review of corporate security policies, standards, and regulatory requirements Developing
Simulation exercises in a realistic cyberwarfare arena environment Team-based incident
Hands-on training with incident response tools and software Case studies
Overview of incident response concepts, methodologies, and best practices Understanding