Course Content
Intro to Cyber
📺 Livestream Timestamp: 4:35:00 — Incident Handling & Response

The NIST framework is good for understanding the theory. But real incidents are messy. Let’s walk through what actually happens when your organization gets hit.

It’s 6 AM. The SOC analyst sees a spike in process termination events. Then they see it: files with .locked extension appearing on shared drives. Ransomware.

Hour 0-1: Detection and Initial Response. Confirm it’s real, escalate to incident commander, assemble IR team.

Hour 1-2: Scope Determination. Check SIEM for when the attack started.


Part of the free Intro to Cyber course by Cover6 Solutions.

Scroll to Top