CYBER.ORG – 4.4.1 Post-Incident Mitigation Techniques

Objective:

Given an incident, apply mitigation techniques or
controls to secure an environment.

Resources:

  • See PowerPoint presentation: 4.4.1 Post-Incident Mitigation Techniques.pptx

Assignment:

  1. Begin reading the 4.4.1 Post-Incident Mitigation Techniques.pptx presentation. This lesson will introduce you to policies, processes, and procedures for responding to security incidents.

Posted: November 4th, 2022