Packt
Incident Response for Windows
Packt

Incident Response for Windows

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Explore investigative procedures applicable to Windows systems

  • Analyze Windows-based endpoints using advanced techniques

  • Conduct infrastructure-wide analyses to identify cybersecurity incidents

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

November 2025

作业

13 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有13个模块

In this section, we examine Windows-specific threat vectors, threat actor motivations, and threat intelligence frameworks to enhance proactive risk management and response strategies.

涵盖的内容

2个视频6篇阅读材料1个作业

In this section, we analyze the attack life cycle phases for Windows systems, map MITRE ATT&CK tactics to unified kill chain stages, and design incident response strategies based on attack stages.

涵盖的内容

1个视频5篇阅读材料1个作业

In this section, we cover incident response strategies for Windows systems, focusing on detection, verification, and containment.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we explore methods for collecting volatile and non-volatile forensic evidence from endpoints, emphasizing best practices for preservation and analysis in incident response.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we examine Phase 1 of the unified kill chain, focusing on initial access techniques like public-facing application exploits, spear-phishing, and drive-by compromises. Key forensic artifacts and analysis methods are discussed to detect and mitigate early-stage threats.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we examine post-exploitation techniques, focusing on C2 communication, registry persistence, and event log analysis to detect and mitigate advanced threats.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we examine network discovery techniques, key asset identification, and methods to detect and mitigate such activities in a Windows environment.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we examine network propagation in cyberattacks, focusing on lateral movement in Windows, detection strategies, and cyclical attack stages to enhance defensive measures.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we examine data types targeted by attackers, techniques for data collection and exfiltration, and methods for detection to enhance defensive strategies.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine the direct and indirect impacts of security incidents, including data loss and reputational damage, and focus on strategies for effective impact assessment and mitigation.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we explore proactive threat hunting strategies, focusing on leveraging threat intelligence, anomaly detection, and known threat actor TTPs to identify and prevent cyber attacks early.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we explore incident containment, eradication, and recovery strategies, focusing on isolating systems, removing threats, and restoring operations using structured playbooks for efficient incident response.

涵盖的内容

1个视频3篇阅读材料1个作业

In this section, we cover incident closure, documentation, and reporting for effective security management.

涵盖的内容

1个视频4篇阅读材料1个作业

位教师

Packt - Course Instructors
Packt
1,186 门课程290,532 名学生

提供方

Packt

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题