| 1.
|
Identify and describe examples of computer security incidents. (I)
|
| 2.
|
Identify and describe the goals of computer security incident
response. (II)
|
| 3.
|
Compare and contrast computer security incident response
methodologies. (III)
|
| 4.
|
Explain the role of risk analysis in computer security incident
response and identify specific types of related risks. (IV)
|
| 5.
|
Explain the roles of the members of an incident response team. (V)
|
| 6.
|
Describe and explain the purpose of pre-incident activities. (VI)
|
| 7.
|
Describe and explain the purpose of activities that take place during
the initial response to an incident. (VII)
|
| 8.
|
Describe and explain the purpose of activities following the
identification of an incident. (VIII)
|
| 9.
|
Identify, explain the purpose, and demonstrate the use of tools used
in computer security incident response. (IX)
|
| 10.
|
Apply the process of collecting volatile system information for later
forensic analysis. (X)
|
| 11.
|
As part of a team, write a comprehensive computer security incident
response plan and deliver an executive-level presentation of the plan.
(XI)
|
|