Malware Analysis, Incident Response, Disaster Recovery & BCP

Incident response & disaster recovery for IT security incidents - ie malware & ransomware on your organisation's network

Malware Analysis, Incident Response, Disaster Recovery & BCP
Malware Analysis, Incident Response, Disaster Recovery & BCP

Malware Analysis, Incident Response, Disaster Recovery & BCP free download

Incident response & disaster recovery for IT security incidents - ie malware & ransomware on your organisation's network

In this course, we will explore various strategies for preventing and responding to IT security incidents, such as ransomware attacks, on your organization's network. The course topics include:

  • An explanation of the key differences between malware analysis and incident response.

  • An overview of different malware types, including viruses, worms, fileless malware, and trojans.

  • Techniques for analyzing known malware, including online file analysis and tools for examining running processes.

  • Strategies for identifying unknown malware using heuristic activity detection and vulnerability analysis.

  • Methods for preventing incidents, such as securing removable storage and utilizing email filtering and analysis tools.

  • Effective incident response methods, including escalation procedures and setting service priorities.

In the real world, protecting against and reacting to security incidents varies for each organization, depending on its size and service priorities. For instance, a company that hosts internal websites may prioritize restoring these services before addressing internal staff issues, or vice versa.

It is crucial to ensure that any changes to your organization’s network align with company policies. This approach guarantees that incidents are resolved smoothly, minimizing downtime and inconvenience to end users. By the end of this course, you will have a solid understanding of both proactive and reactive measures to enhance your organization’s IT security posture.

Join us to gain the essential skills needed to safeguard your network and respond effectively to security threats.


In the disaster recovery portion of this course, we'll be covering the basics surrounding DR and BCP planning, as well as some different types of disasters and the best ways to mitigate against them.


Topics on this course are as follows:

* Overview of Disaster Recovery (DR) and Business Continuity Planning (BCP)

* Mitigating against different types of disasters and maximising the chances of data recovery

* Common issues than can occur during a DR test or real world disaster

* Assessing the impact of a DR test or disaster on your business

* Maintaining data protection compliance during a disaster situation

* Implications of allowing Bring Your Own Device (BYOD)

* Security considerations of any recovery strategies, i.e. ensuring the same level of physical and logical security as you would at a primary business premises.


Also included on the course are some examples of how a DR plan would be implemented in the real world, for example having key members of staff available throughout testing and having a way to contact them quickly should a real world disaster occur.

Whilst it is, of course, impossible to plan for every situation, a good analysis of the potential impact of a disaster will go a long way in ensuring continuity of service within your organisation and allow the minimum possible level of inconvenience to customers.