Incident response
View Profile
Computer Incident Response Planning
September 7, 2012 by
McGraw Hill
Share:
See the McGraw Hill excerpt: Computer Incident Response Planning here:
https://resources.infosecinstitute.com/wp-content/uploads/039-Xc01.pdf
Author bio:
N.K. McCarthy has more than 20 years of experience in the IT sector, most recently managing the information security operations/threat and vulnerability management team for a Fortune 100 corporation. He is a retired Lieutenant Colonel in the U.S. Marine Corps Reserve where he served as an Information Warfare Officer working at the U.S. Strategic Command, the Pentagon, and the National Security Agency (NSA). Mr. McCarthy is currently on the Board of Directors of the San Francisco Bay Area and Silicon Valley chapter of the FBI’s Infragard program.
Posted: September 7, 2012
Share:
Uh-oh!
We've encountered a new and totally unexpected error.
Get instant boot camp pricing
Thank you!
A new tab for your requested boot camp pricing will open in 5 seconds. If it doesn't open, click here.
Author
McGraw Hill
In this Series
- Computer Incident Response Planning
- How will zero trust change the incident response process?
- How to build a proactive incident response plan
- Sparrow.ps1: Free Azure/Microsoft 365 incident response tool
- Uncovering and remediating malicious activity: From discovery to incident handling
- DHS Cyber Hunt and Incident Response Teams (HIRT) Act: What you need to know
- When and how to report a breach: Data breach reporting best practices
- Cyber Work Podcast recap: What does a military forensics and incident responder do?
- Top 8 cybersecurity books for incident responders in 2020
- Digital forensics and incident response: Is it the career for you?
- 2020 NIST ransomware recovery guide: What you need to know
- Network traffic analysis for IR: Data exfiltration
- Network traffic analysis for IR: Basic protocols in networking
- Network traffic analysis for IR: Introduction to networking
- Network Traffic Analysis for IR — Discovering RATs
- Network traffic analysis for IR: Analyzing IoT attacks
- Network traffic analysis for IR: TFTP with Wireshark
- Network traffic analysis for IR: SSH protocol with Wireshark
- Network traffic analysis for IR: Analyzing DDoS attacks
- Wireshark for incident response 101
- Network traffic analysis for IR: UDP with Wireshark
- Network traffic analysis for IR: TCP protocol with Wireshark
- Network Traffic Analysis for Incident Response: Internet Protocol with Wireshark
- ICMP protocol with Wireshark
- Cyber Work with Infosec: How to become an incident responder
- Simple Mail Transfer Protocol (SMTP) with Wireshark
- Internet Relay Chat (IRC) protocol with Wireshark
- Hypertext transfer protocol (HTTP) with Wireshark
- Network traffic analysis for IR: FTP protocol with Wireshark
- Infosec skills – Network traffic analysis for IR: DNS protocol with Wireshark
- Network traffic analysis for IR: Data collection and monitoring
- Network traffic analysis for Incident Response (IR): TLS decryption
- Network traffic analysis for IR: Address resolution protocol (ARP) with Wireshark
- Network traffic analysis for IR: Alternatives to Wireshark
- Network traffic analysis for IR: Statistical analysis
- Network traffic analysis for incident response (IR): What incident responders should know about networking
- Network traffic analysis for IR: Event-based analysis
- Network traffic analysis for IR: Connection analysis
- Network traffic analysis for IR: Data analysis for incident response
- Network traffic analysis for IR: Network mapping for incident response
- Network traffic analysis for IR: Analyzing fileless malware
- Network traffic analysis for IR: Credential capture
- Network traffic analysis for IR: Content deobfuscation
- Traffic analysis for incident response (IR): How to use Wireshark for traffic analysis
- Network traffic analysis for IR: Threat intelligence collection and analysis
- Network traffic analysis for incident response
- Creating your personal incident response plan
- Security Orchestration, Automation and Response (SOAR)
- Don’t Let Your Crisis Response Create a Crisis
- Top six SIEM use cases
- Expert Tips on Incident Response Planning & Communication
Related Bootcamps
Related Articles
Incident response
How to build a proactive incident response plan

November 26, 2021
Waqas
Incident response
Sparrow.ps1: Free Azure/Microsoft 365 incident response tool
May 5, 2021
Mosimilolu Odusanya
Incident response
Uncovering and remediating malicious activity: From discovery to incident handling

April 13, 2021
Susan Morrow