Enterprise Security Case Management
In this online course about Enterprise Security Case Management, you will learn about tools and techniques which help cybersecurity practitioners manage evidence and related case data to preserve their integrity.
Course Description
Improper case management can lead to adverse outcomes and significantly increase the time it takes a security team to detect or respond to active threats in an enterprise environment. If and when security cases result in litigation, it is vital that the case management processes and workflows followed be unimpeachable, and that as much relevant, reliable information is captured before, during, and after executing a case.
Security of the evidence and related data are equally important. Leaving these vulnerable negatively impacts their integrity. This course will teach you concepts such as chain of custody, secure evidence and data storage, why data retention, destruction, and backup are necessary considerations, as well the best methods for capturing contemporaneous notes.
By the end of this course, students should be able to:
Course Goals
By the end of this course, students should be able to:
Create and complete chain of custody and examination forms
Determine how and where to securely store case evidence and related data
Module 1: Introduction
Module 2: Core Concepts
Module 3: Evidence and Case Data Storage
Module 4: Workflow and Managing Cases
Module 5: Assigning Access
Module 6: Conclusion
Module 7: Course Assessment
User Reviews
Be the first to review “Enterprise Security Case Management”
You must be logged in to post a review.
There are no reviews yet.