O'Reilly logo

CompTIA Cybersecurity Analyst (CSA+) Cert Guide by Troy McMillan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Incident Recovery and Post-Incident Response

This chapter covers the following topics:

3.0 Cyber Incident Response

3.5 Summarize the incident recovery and post-incident response process.

Image Containment Techniques: Discusses techniques such as segmentation, isolation, removal, and reverse engineering.

Image Eradication Techniques: Describes various methods of removing threats, including sanitization, reconstruction/reimage, and secure disposal.

Validation: Covers additional steps to take to validate removal to ensure that the current state is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required