Computer Security Incident Handling Guide Logo

Computer Security Incident Handling Guide

0
Free
Visit Website

The NIST Special Publication 800-61 Revision 2 is a comprehensive guide for computer security incident handling, providing organizations with guidelines for establishing incident response capabilities and handling incidents efficiently and effectively. It outlines the importance of incident response planning, incident classification, incident containment, eradication, recovery, and post-incident activities. The guide also covers incident handling procedures, including incident detection, reporting, and response strategies. The publication provides a structured approach to incident response, emphasizing the need for a comprehensive incident response plan, incident response team, and continuous improvement of incident response capabilities.

FEATURES

ALTERNATIVES

A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

A pocket reference guide providing various options for navigating and pivoting through different environments and situations.

A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.

A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.

A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

PINNED