Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Build Security Incident Response for GDPR Data Protection
Section 1: Introduction
1. Welcome & Intro (2:07)
2. Set your expectations (0:54)
3. A 1st touch of what you will really get in the course (6:10)
4. Presentations (ppt)
Section 2: Incident Response in CyberSecurity
5. What is Incident Response and why do I need it? (4:14)
6. Incident Response Team (8:52)
7. Incident Response Process and Procedures (11:05)
8. Types of Security Incidents (8:19)
9. Incident Response Tools - general (10:26)
10. What is a SIEM? (3:05)
11. Incident Response Training (5:49)
12. What is automation in incident response (8:15)
Section 3: Building a Security Operations Center (SOC)
13. What is a NOC? (2:37)
14. What is a SOC? (2:50)
15. Integrated NOC and SOC (6:26)
16. Mission, Team and Required Training (6:39)
17. Types of SOC (3:53)
18. Building a SOC (5:39)
19. Cheat Sheets to help you in configuring your systems (9:30)
Section 4: GDPR and Incident Response
20. GDPR intro (2:49)
21. GDPR effects on Incident Response (5:42)
22. How to create an effective IR plan (10:49)
23. GDPR Incident Response Process (10:13)
24. Lets draft the IRM Procedure (4:30)
25. How to treat data breaches (4:55)
Section 5: GDPR Incident Response Methodologies (IRM)
26. IRM1 - Worm Infection (3:11)
27. IRM2 - Windows Intrusion (2:55)
28. IRM3 - Unix/Linux Intrusion Detection (2:22)
29. IRM4 - DDoS (3:54)
30. IRM5 - Malicious Network Behaviour (2:26)
31. IRM6 - Website Defacement (2:22)
32. IRM7 - Windows malware detection (2:35)
33. IRM8 - Blackmail (1:55)
34. IRM9 - SmartphoneMalware (2:55)
35. IRM10 - Social Engineering (2:55)
36. IRM11 - Information Leakage (2:33)
37. IRM12 - Insider Abuse (1:35)
38. IRM13 - Phishing (1:33)
39. IRM14 - Scam (1:41)
40. IRM15 - Ransomware (2:02)
Section 6: Incident Response Tools for GDPR compliance - free vs enterprise
41. Lessons learned by working in a SOC (8:00)
42. A list of open source tools to use (6:09)
43. Windows Defender ATP (9:15)
Section 7: Banking challenges related to cyber risk
44. Today Challenges (5:35)
45. Target and Distribution (6:19)
46. Attack Methods (6:47)
47. Infection vectors (5:55)
48. Targeted attacks against financial institutions (5:20)
49. Mobile platform and email scams (9:28)
50. Takedowns and Conclusions (6:24)
Section 8: Financial Malware history with examples
51. Past 3 decades of malware (part 1) (6:48)
52. Past 3 decades of malware (part 2) (10:52)
53. The architecture of financial malware (5:40)
54. Zeus (12:35)
55. Zeus GameOver (11:15)
56. SpyEye (11:03)
57. IceIX (8:29)
58. Citadel (10:48)
59. Carberp (7:25)
60. Shylock (7:33)
61. Bugat (2:55)
62. Dyre (11:14)
63. Dridex (10:13)
64. Shifu (7:06)
65. Tinba (5:55)
Section 9: Making a business case for Financial Malware
66. Why Fraud Risk Engines fail (8:23)
67. How to bypass 2 factor authentication (2FA) (7:17)
68. Fraud Prevention Technology (8:40)
69. Compliance and Legal Issues (4:45)
70. Customer impact (5:57)
71. Selecting the right cybercrime solution (13:36)
72. Malware detection (3:48)
73. Malware detection - advanced (5:43)
74. Malware detection - how technology can help (7:06)
75. Criminal Detection & Account Takeover (5:39)
76. What about mobile banking? (9:48)
Section 10: Some simple hacking attempts - demo
77. Lab setup (2:58)
78. XSRF attack (7:12)
79. Compromising Public server (7:27)
80. Break-In: Compromising the victim computer (2:58)
81. Other Web Application Attack Example (4:16)
82. Locky Ransomware (5:58)
83. Gathering Info & Exfiltrate (9:12)
Section 11: Conclusion
84. Final thoughts and other documents (1:21)
35. IRM10 - Social Engineering
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock