Cyber Security Incident Management

SCS 3205
Closed
University of Toronto
Toronto, Ontario, Canada
Instructor at University of Toronto - School of Continuing Studies
3
Timeline
  • January 17, 2020
    Experience start
  • February 22, 2020
    Experience end
Experience
1/1 project matches
Dates set by experience
Preferred companies
Anywhere
Any
Any industries

Experience scope

Categories
Information technology Operations Project management
Skills
project planning business consulting strategy data analysis
Learner goals and capabilities

Is your organization developing or updating its incident response process? In this course, students in the University of Toronto cybersecurity program will create or revise an incident response plan and playbook that you can deploy to mitigate the impact of attacks and threats.

Learners

Learners
Any level
20 learners
Project
16 hours per learner
Learners self-assign
Teams of 4
Expected outcomes and deliverables

The final project deliverable will include documents outlining:

  • An Incident Response Plan,
  • Incident Response Playbooks,
  • Responses to outline steps to be taken during cyber security incidents, or
  • Presentations outlining how to leverage tools
Project timeline
  • January 17, 2020
    Experience start
  • February 22, 2020
    Experience end

Project Examples

Requirements

In teams of 3-4, students will work together to develop or revise an incident response plan and playbook to be able to respond to such attacks and threats. Students can investigate incidents, develop, refine and test your incident management plans; organize and train response teams; develop corrective actions; integrate incident management plans with a disaster recovery plans; business continuity plans, and will present findings and tools needed to mitigate these risks.

Project examples include:

  • Developing cybersecurity incident response plans
  • Developing detailed incident response playbooks
  • Answering questions related to a cybersecurity incident scenario
  • Leveraging tools and technologies related to handling and responding to cybersecurity incidents

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

  • Q - Checkbox
  • Q - Checkbox
  • Q - Checkbox