Crisis management Incident Handling: Primer
RCCE students will learn incident detection, containment procedures, evidence preservation, communication protocols, and post-incident analysis. RCCE students will learn to respond to security incidents with structured methodologies, coordinate cross-functional teams under pressure, execute containment and recovery operations, and drive continuous improvement through thorough post-incident reviews. This incident response course prepares students to act decisively during security incidents with structured workflows and clear decision frameworks. Starting from foundational concepts, RCCE students will learn containment, evidence collection, eradication, and recovery procedures specific to this domain. Students practice incident scenarios that build the composure, coordination, and documentation skills essential for effective incident handling.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Crisis management Incident Handling: Primer
- Execute hands-on tasks for crisis management
- Execute hands-on tasks for incident handling: primer
- Explain Course Overview fundamentals
- Execute hands-on tasks for what you will learn
- Execute hands-on tasks for course structure — covering Incident detection and triage methods, 4 modules covering full IR lifecycle.
- Execute hands-on tasks for target outcomes — covering Respond to incidents with structured workflows.
- Build detections and response workflows for privilege escalation
- Execute hands-on tasks for avg data breach cost (2024)
- Execute hands-on tasks for business impact of effective ir — covering Reduces breach containment time by 50%+.
- Execute hands-on tasks for nist sp 800-61 rev. 2 key principles — covering IR is cyclical, not linear.
- Execute hands-on tasks for when to use which — covering SANS: 6 discrete phases.
| Module 01 | Crisis Management |
| Module 02 | Incident Handling: Primer |
| Module 03 | Course Overview |
| Module 04 | What You Will Learn |
| Module 05 | Course Structure |
| Module 06 | Target Outcomes |
| Module 07 | What Is Incident Response? |
| Module 08 | Why Incident Response Matters |
| Module 09 | Avg Data Breach Cost (2024) |
| Module 10 | Business Impact of Effective IR |
| Module 11 | NIST SP 800-61 Rev. 2 Key Principles |
| Module 12 | When to Use Which |
| Module 13 | Incident Classification |
| Module 14 | Malware Infection |
All hands-on labs run on Rocheston Rose X OS. Students practice crisis management incident handling: primer by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for crisis management
- Lab 2: Execute hands-on tasks for incident handling: primer
- Lab 3: Explain Course Overview fundamentals
- Lab 4: Execute hands-on tasks for what you will learn
- Lab 5: Execute hands-on tasks for course structure
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Crisis management Incident Handling: Primer, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI