Leadership & Strategic
15 hours (distributed over 3 days)
Information Security Managers, Response Team Leaders
Experience in the cybersecurity field
Understanding the basics of security incident handling
Completion of previous level programs

- From analysis to operation through 5 key stages
- Different roles within the team: Analyst, Engineer, Coordinator
- Technical, managerial, and soft skills
- Team charter, team policies, and Service Level Agreements (SLA)
- Collaboration with the Security Operations Center (SOC), telecommunications regulatory authority, and security agencies
- Preparation, Detection, Analysis, Containment, Eradication, Recovery, and Lessons Learned
- Preparing team tools and equipment
- Determining if it is a security event or an incident
- Short-term and long-term procedures for incident containment
- Lessons learned and process improvement
- TheHive, RTIR, Jira Service Management
- Autopsy, FTK Imager, EnCase
- Wireshark, tcpdump, NetworkMiner
- MISP platforms and others for sharing indicators
- Setting up a secure lab for malware analysis
- Time to Detect, Contain, and Recover
- Incident reports and trend analysis
- Tabletop exercises and breach simulations
- Professional certifications and training courses
- Maturity model and its levels
After completing all course requirements, you can apply to receive an accredited Certificate of Completion from Ru’ya Academy for Leadership and Technology.
