Introduction
                                    
                                        Incident response
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                1. Incident Management
                                    
                                        Build an incident response program
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Incident communications plan
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Incident identification
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Escalation and notification
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Mitigation
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Recovery and reconstitution
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Lessons learned and reporting
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Validation
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                2. Investigations and Forensics
                                    
                                        Conducting investigations
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Evidence types
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Introduction to forensics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        System and file forensics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Network forensics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Software forensics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Embedded device forensics
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Chain of custody
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Reporting and documenting incidents
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Electronic discovery (eDiscovery)
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                3. Business Continuity
                                    
                                        Business continuity planning
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Business continuity controls
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        High availability and fault tolerance
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                4. Disaster Recovery
                                    
                                        Disaster recovery overview
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Backups
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Validating backups
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Disaster recovery sites
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Testing BC/DR plans
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                Conclusion
                                    
                                        What's next?
                                            
                                                ()