From the course: Incident Response Frameworks
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Containment and eradication
From the course: Incident Response Frameworks
Containment and eradication
Welcome to this video, Containment and Eradication. A hacker has breached your network and is actively stealing data. Every second counts. How do you stop the bleeding and eliminate the threat before catastrophic damage occurs? This is where containment and eradication become your critical lifelines. In this video, we'll examine the containment and eradication phases of the SANS Incident Response Framework. We'll explore strategic approaches to limiting threat spread, timing considerations for containment decisions, and systematic methods for completely eliminating malicious activity from compromised systems. By the end of this video, you will be able to define containment strategies for cybersecurity incident response, identify short-term and long-term containment approaches effectively, explain eradication processes for eliminating malicious threat activity, describe documentation requirements during containment and eradication phases and analyze timing considerations for strategic…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.