BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20210924T130000Z
DTEND:20210924T193000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:First Responder and Incident Handling ONLINE
DESCRIPTION:Roane State Community College Workforce\, Economic Development and Technology Programs - First Responder and Incident Handling ONLINE\n\n\n\nThis course covers network defense and incident response methods\, tactics\, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks\, and for executing standardized responses to such incidents. The course introduces tools\, tactics\, and procedures to manage cybersecurity risks\, identify various types of common threats\, evaluate the organization's security\, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur.\n\n \nLesson 1: Assessment of Information Security Risks\n\n\n	Topic A: The Importance of Risk Management\n	Topic B: Assess Risk\n	Topic C: Mitigate Risk\n	Topic D: Integrating Documentation into Risk Management\n\n\nLesson 2: Analyzing Attacks on Computing and Network Environments\n\n\n	Topic A: System Hacking Attacks: Assessing the Impact\n	Topic B: Web-Based Attacks: Assessing the Impact\n	Topic C: Malware: Assessing the Impact\n	Topic D: Hijacking and Impersonation Attacks: Assessing the Impact\n	Topic E: DoS Incidents: Assessing the Impact\n	Topic F: Threats to Mobile Security: Assessing the Impact\n	Topic G: Threats to Cloud Security: Assessing the Impact\n\n\nLesson 3: Manage Vulnerabilities in the Organization \n\n\n	Topic A: Implement a Vulnerability Management Plan \n	Topic B: Examine Common Vulnerabilities\n	Topic C: Conduct Vulnerability Scans\n\n\nLesson 4: Evaluate Security by Implementing Penetration Testing\n\n\n	Topic A: Conduct Penetration Tests on Network Assets\n	Topic B: Follow Up on Penetration Testing\n\n\nLesson 5: Analyze Log Data\n\n\n	Topic A: Common Tools to Analyze Logs\n	Topic B: SIEM Tools for Analysis\n\n\nLesson 6: Response to Cybersecurity Incidents\n\n\n	Topic A: Deployment of Incident Handling and Response Architecture Topic\n	Topic B: Containment and Mitigation of Incidents\n	Topic C: Preparation for Forensic Investigation as a CSIRT\n\n\nLesson 7: Investigating Cybersecurity Incidents\n\n\n	Topic A: Use a Forensic Investigation Plan\n	Topic B: Securely Collect and Analyze Electronic Evidence\n\n\nMiscellaneous software that will be explored in the course data files:\n\n\n	Oracle  VM VirtualBox version 5.1.30 (VirtualBox-5.1.30-118389-Win.exe)\n	Wireshark version 2.0.1 (Wireshark-win64-2.0.1.exe)\n	Snort  version 2.9.8.0 (Snort_2_9_8_0_Installer.exe).\n	icmpsh (icmpsh.zip).\n	Greenbone Security Manager Community Edition version 4.1.7 (gsm_ce_4.1.7.iso)\n	XAMPP version 5.6.15 (xampp-win32-5.6.15-1-VC11-installer.exe).\n	SeaMonster version 5 (SeaMonster5_win32.x86.zip).\n	OpenSSH for Windows version 7.1 (setupssh-7.1p2-1.exe).\n	PuTTY version 0.67 (putty.exe).\n	Process Explorer version 16.21 (procexp.exe).\n	Splunk  Enterprise version 7.0.2 (splunk-7.0.2-03bbabbd5c0f-x64-release.msi).\n	Log Parser version 2.2 (LogParser.msi).\n	Log Parser Studio version 2.0 (LPSDV2.D2.zip).\n\n\nThis is an instructor led online course.  The instructor will be with you and available during the entire course.
X-ALT-DESC;FMTTYPE=text/html:<font color="#000000" face="Arial\, Helvetica\, sans-serif"><span style="font-size: 14px\;">Roane State Community College Workforce\, Economic&nbsp\;Development and Technology Programs - First Responder and&nbsp\;Incident Handling ONLINE<br />\n<br />\nThis course covers network defense and incident response methods\, tactics\, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks\, and for executing standardized responses to such incidents. The course introduces tools\, tactics\, and procedures to manage cybersecurity risks\, identify various types of common threats\, evaluate the organization&#39\;s security\, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur.</span></font><br />\n&nbsp\;\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 1: Assessment of Information Security Risks</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: The Importance of Risk Management</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: Assess Risk</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic C: Mitigate Risk</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic D: Integrating Documentation into Risk Management</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 2: Analyzing Attacks on Computing and Network Environments</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: System Hacking Attacks: Assessing the Impact</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: Web-Based Attacks: Assessing the Impact</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic C: Malware: Assessing the Impact</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic D: Hijacking and Impersonation Attacks: Assessing the Impact</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic E: DoS Incidents: Assessing the Impact</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic F: Threats to Mobile Security: Assessing the Impact</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic G: Threats to Cloud Security: Assessing the Impact</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 3: Manage Vulnerabilities in the Organization&nbsp\;</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: Implement a Vulnerability Management Plan&nbsp\;</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: Examine Common Vulnerabilities</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic C: Conduct Vulnerability Scans</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 4: Evaluate Security by Implementing Penetration Testing</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: Conduct Penetration Tests on Network Assets</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: Follow Up on Penetration Testing</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 5: Analyze Log Data</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: Common Tools to Analyze Logs</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: SIEM Tools for Analysis</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 6: Response to Cybersecurity Incidents</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: Deployment of Incident Handling and Response Architecture Topic</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: Containment and Mitigation of Incidents</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic C: Preparation for Forensic Investigation as a CSIRT</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Lesson 7: Investigating Cybersecurity Incidents</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic A: Use a Forensic Investigation Plan</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Topic B: Securely Collect and Analyze Electronic Evidence</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="box-sizing: border-box\; font-size: 16px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Miscellaneous software that&nbsp\;<em style="box-sizing: border-box\;">will be explored</em>&nbsp\;in the course data files:</span></span></p>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 12px\;">\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Oracle&reg\; VM VirtualBox version 5.1.30 (VirtualBox-5.1.30-118389-Win.exe)</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Wireshark version 2.0.1 (Wireshark-win64-2.0.1.exe)</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Snort&reg\; version 2.9.8.0 (Snort_2_9_8_0_Installer.exe).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">icmpsh (icmpsh.zip).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Greenbone Security Manager Community Edition version 4.1.7 (gsm_ce_4.1.7.iso)</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">XAMPP version 5.6.15 (xampp-win32-5.6.15-1-VC11-installer.exe).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">SeaMonster version 5 (SeaMonster5_win32.x86.zip).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">OpenSSH for Windows version 7.1 (setupssh-7.1p2-1.exe).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">PuTTY version 0.67 (putty.exe).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Process Explorer version 16.21 (procexp.exe).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Splunk&reg\; Enterprise version 7.0.2 (splunk-7.0.2-03bbabbd5c0f-x64-release.msi).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Log Parser version 2.2 (LogParser.msi).</span></span></li>\n	<li style="box-sizing: border-box\; font-stretch: normal\; line-height: normal\;"><span style="box-sizing: border-box\; font-size: 14px\;"><span style="box-sizing: border-box\; font-family: Arial\, Helvetica\, sans-serif\;">Log Parser Studio version 2.0 (LPSDV2.D2.zip).</span></span></li>\n</ul>\n\n<p style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Arial\; caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\;"><span style="caret-color: rgb(0\, 0\, 0)\; color: rgb(0\, 0\, 0)\; font-family: Arial\, Helvetica\, sans-serif\; font-size: 14px\;">This is an instructor led online course.&nbsp\; The instructor will be with you and available during the entire course.</span></p>\n
LOCATION:ONLINE
UID:e.2172.9604
SEQUENCE:3
DTSTAMP:20260509T105849Z
URL:http://business.roanechamber.com/events/details/first-responder-and-incident-handling-online-09-24-2021-9604
END:VEVENT

END:VCALENDAR
