1.
|
Identify and describe examples of computer security incidents. (I)
|
2.
|
Identify and describe the goals of computer security incident
response. (II)
|
3.
|
Compare and contrast computer security incident response
methodologies. (III)
|
4.
|
Explain the role of risk analysis in computer security incident
response and identify specific types of related risks. (IV)
|
5.
|
Explain the roles of the members of an incident response team. (V)
|
6.
|
Describe and explain the purpose of pre-incident activities. (VI)
|
7.
|
Describe and explain the purpose of activities that take place during
the initial response to an incident. (VII)
|
8.
|
Describe and explain the purpose of activities following the
identification of an incident. (VIII)
|
9.
|
Identify, explain the purpose, and demonstrate the use of tools used
in computer security incident response. (IX)
|
10.
|
Apply the process of collecting volatile system information for later
forensic analysis. (X)
|
11.
|
As part of a team, write a comprehensive computer security incident
response plan and deliver an executive-level presentation of the plan.
(XI)
|
|