Chapter 9. Incident Recovery and Post-Incident Response

This chapter covers the following topics:

3.0 Cyber Incident Response

3.5 Summarize the incident recovery and post-incident response process.

Image Containment Techniques: Discusses techniques such as segmentation, isolation, removal, and reverse engineering.

Image Eradication Techniques: Describes various methods of removing threats, including sanitization, reconstruction/reimage, and secure disposal.

Validation: Covers additional steps to take to validate removal to ensure that the current state is ...

Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.