FREE COURSE | +1 CPE
Cyber Incident Response: Plans, Processes and Procedures
In this course, we will teach you how to level up your company's readiness for a cyber incident: from requirements gathering to process design and documentation. We'll also cover some real-world process examples to show you how incident response works in real life.
Start the course:
01 - Are You Prepared for a Cyber Incident?
02 - Creating Your Incident Response Plan
03 - Recovery Plans and Procedures
04 - Security Procedures
05 - Your Cybersecurity Repository
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
Varonis shows you where sensitive data is concentrated and automatically remediates overexposure—getting you to least privilege without human intervention. Our machine learning analyzes permissions and user behavior to highlight where users have access to data they don't use or need.