Skip to main content

ESIR103 - Incident Response Step 2 - Identification


CyberWarrior
Enrollment in this course is by invitation only

About this course

After a cybersecurity incident, we must know how to get our computer equipment back in perfect working order. Therefore, we must know how to recover our data if we are attacked by malware.

In the lab of this course we will know the steps to follow for a recovery process and we will make a malware that will be used for our recovery lab.

It is important to know the importance of backups for a company. They save us from cybersecurity incidents or any system malfunctions.

Requirements

  • Windows 10 Virtual Machine.
  • 4GB RAM.
  • 2 Core CPU.
  • Google Chrome browser.