I Hack I Conquer
search
⌘Ctrlk
I Hack I Conquer
  • Welcome to Aleš Tománek's notes on Cyber
  • Certificates & Badges
  • Enumeration
  • LINUX
  • Windows
  • Cisco Networking Academy
  • TryHackMe.com Cyber Security 101
  • NCFE L3 Cyber - Assignments and Feedback
    • UNIT 1 | Understanding cyber security principles
    • UNIT 2 | Threat intelligence in cyber security
    • UNIT3 | Cyber security testing, vulnerabilities and controls
    • UNIT 4 | Cyber security incident response
      • 1. Describe what a cyber security incident response plan is used for (AC 1.1)
      • 2. Explain when a cyber security incident response plan is used (AC 1.2)
      • 3. Describe the stages of a cyber security incident response lifecycle (AC 1.3)
      • 4. Explain why it is important to maintain an up to date cyber security incident log (AC 2.1)
      • 5. Explain the steps to be included within a cyber security incident response plan (AC 2.2)
      • 6. Explain why it is important to have a cyber security incident response plan (AC 2.3)
      • 7. Develop a cyber security incident response plan for an organisation (AC 2.4)
      • 8. Explain what is meant by incident post mortem (AC 3.1)
      • 9. Explain the structure of an incident post mortem (AC 3.2)
      • 10a. Consider the importance of the following when carrying out an incident post mortem (AC 3.3) in
      • 11. Create a post mortem report of an incident (AC 3.4)
      • 12. Reflect upon the report and make recommendations based on the findings (AC 3.5)
    • UNIT 5 | Understand legislation and ethical conduct within cyber security
    • UNIT 6 | Professional skills and behaviours for cyber security
  • OU Cyber Foundations
  • Python - 100 Days of Code: The Complete Python Pro Bootcamp - Notes
  • Random Experiments
  • Unsorted notes on everything
  • Contact me
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. NCFE L3 Cyber - Assignments and Feedbackchevron-right
  2. UNIT 4 | Cyber security incident response

4. Explain why it is important to maintain an up to date cyber security incident log (AC 2.1)

Previous3. Describe the stages of a cyber security incident response lifecycle (AC 1.3)chevron-leftNext5. Explain the steps to be included within a cyber security incident response plan (AC 2.2)chevron-right

Last updated 11 months ago