Chapter 9. Incident Recovery and Post-Incident Response
This chapter covers the following topics:
3.0 Cyber Incident Response
3.5 Summarize the incident recovery and post-incident response process.
Containment Techniques: Discusses techniques such as segmentation, isolation, removal, and reverse engineering.
Eradication Techniques: Describes various methods of removing threats, including sanitization, reconstruction/reimage, and secure disposal.
Validation: Covers additional steps to take to validate removal to ensure that the current state is ...
Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.