Incident Response and Handling

Class

In-depth coverage of incident response and incident handling, including identifying sources of attacks and security breaches; analyzing security logs; recovering the system to normal; performing postmortem analysis; and implementing and modifying security measures.

End of Course Outcomes

Upon completion of the course the student will be able to:

  • Identify sources of attacks;  

  • Restore the system to normal operation;  

  • Identify and prevent security threats;  

  • Perform a postmortem analysis;  

  • Identify computer investigation issues;  

  • Identify the roles and responsibility of the incident response team. 

Lab Fee
$24
Required Textbooks

MindTap: Principles of Incident Response & Disaster Recovery | 3rd Edition
ISBN: 9780357508350
Author: Michael E. Whitman / Herbert J. Mattord
Publisher: Cengage Learning

ISBN-13
9780357508350
Evaluation Standards

 

 

Final grades will be calculated by the following scale:

A: 90% and above
B: 80 to 89%
C: 70 to 79%
D: 60 to 69%
F: less than 60%

Instructional Methods

Lecture, hands-on computer activities, reading and writing assignments, quizzes, and exams. Reading, lab practice, exams, and assignments are accessed and submitted through the Canvas virtual classroom.

Required Materials

Additional requirements for use from home or office:

  • Desktop or Laptop Computer
  • Internet Access
  • Webcam
Program Learning Outcomes

Information Technology AAS – Cyber Security Option 

  • This degree gives students substantial knowledge of techniques required for network and information security assurance.  

  • Students work with desktop programs, client-server applications, virtual platforms and cloud services.  

  • Students will detect and report complex security events, create incident detection and analysis tools through programming techniques and procedures, using appropriate languages and software.  

  • The primary emphasis of the curriculum is hands-on training in information assurance for network hardware, software and data, including physical security, backup procedures, relevant tools, encryption and incident handling and reporting. Instruction will also include related computer areas that provide the ability to adapt as information systems evolve.  

  • Students who successfully complete the program should qualify for employment in business, industry, and government organizations in such positions as Network Security Analyst; Information Security Analyst; Penetration Tester; Security Systems Analyst; Cybersecurity Analyst; Cyber Incident Analyst; and Cyber Security - Incident Responder. 

Disabilities

Any student with a documented disability (e.g. learning, psychiatric, vision, hearing, etc.) may contact the Office on the Weatherford College Weatherford Campus to request reasonable accommodations. Phone: 817-598-6350 Office Location: Office Number 118 in the Student Services Building, upper floor. Physical Address: Weatherford College 225 College Park Drive Weatherford, TX.

Academic Integrity

Academic Integrity is fundamental to the educational mission of Weatherford College, and the College expects its students to maintain high standards of personal and scholarly conduct. Academic dishonesty of any kind will not be tolerated. Academic dishonesty includes, but is not limited to, cheating on an examination or other academic work, plagiarism, collusion, and the abuse of resource materials including unauthorized use of Generative AI. Departments may adopt discipline specific guidelines on Generative AI usage approved by the instructional dean. Any student who is demonstrated to have engaged in any of these activities will be subject to immediate disciplinary action in accordance with institutional procedures.

Hope Statement

Any student who faces challenges securing basic resources such as food, clothing, or housing and believes this may affect their performance in their course of study is urged to contact the Director of Student Resources, Dr. Deborah Cregger, for support at (817) 598-6444. Her office is on the first floor of Student Services. If the student prefers, they may contact their instructor, who can reach out on their behalf. 

Student Intellectual Property Rights

A student shall retain all rights to work created as part of instruction or using College District technology resources.

SCANS

The Secretary’s Commission on Achieving Necessary Skills (SCANS) identified competencies in the area of Resources, Interpersonal, Information, Systems, and Technology; and foundation skills in the areas of Basic Skills and Personal Qualities.

WORKPLACE COMPETENCIES -- Effective workers can productively use:

  • Resources -- They know how to allocate (C1) time
  • Information -- They can (C5) acquire and evaluate data, (C6) organize, and maintain files, and (C8) use computers to process information.
  • Interpersonal Skills -- They can work on (C9) teams, and (C14) work well with people from culturally diverse backgrounds.
  • Systems -- They (C15) understand social, organizational, and technological systems; (C16) they can monitor and correct performance; and (17) they can design or improve systems.
  • Technology -- They can (C18) select equipment and tools, (C19) apply technology to specific tasks, and (C20) maintain and troubleshoot equipment.

FOUNDATION SKILLS -- Competent workers in the high-performance workplace need:

  • Basic Skills -- (F1) reading, (F2) writing, (F3) arithmetic and (F4) mathematics, and (F5) listening
  • Thinking Skills -- (F8) to make decisions, (F9) to solve problems, (F10) to visualize, and (F12) to reason.
  • Personal Qualities -- (F13) individual responsibility, (F14) self-esteem, (F15) sociability, (F16) self-management, and (F17) integrity
Contact Hours
96
SCH Hours
3
Revised
Spring 2024