
The Cybersecurity Incident Command course is designed to provide students with the foundational concepts and techniques necessary to manage a cybersecurity incident.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date: WWHF Deadwood 2025 - Link at bottom.
Description
The Cybersecurity Incident Command course is designed to provide students with the foundational concepts and techniques necessary to manage a cybersecurity incident.
The focus is on building knowledge and skills in the operational and strategic levels of incident response such as crisis communications, crafting containment and eradication plans and managing the various teams leveraged during an incident.
Students will first be exposed to incident command fundamentals. From here, they will be guided through the various stages of incident response activities such as properly scoping an incident response, addressing escalations, crafting a containment plan, removing the threat actor from the network, and returning to normal. Throughout this process, they will also be shown how to incorporate technical actions such as digital forensics and network modifications in response to an incident. In addition to the technical aspects, students will also be instructed to address the operational concerns in incorporating various business units such as legal, senior management, marketing, and facilities during an incident.
To reinforce these concepts, students will work through a realistic incident scenario during which they will be required to apply the concepts taught using the IRIS-DFIR platform and document templates.
FAQ
To put these concepts into a practical framework, a realistic scenario will be used throughout the course where they will have to put into action the key concepts such as assisting an executive committee with crisis communications or integrating digital forensic concepts into the IR process.
The critical role that the Cybersecurity Incident Commander plays
Managing the entire incident response process
Key actions and decisions that the IC needs to consider
Managing the various teams that are part of an incident response
How to leverage applications and IR templates to capture key data points
Getting back to normal operations
Properly documenting and closing out an incident
Note: This will not be a technically heavy course and even junior level security operations personnel or novices will gain value.
About the Instructor

Gerard Johansen
"Digital Forensics and Incident Responder"Bio
A cyber security professional with over a decade of experience specializing in digital forensics, incident response, and threat intelligence. After a decade in law enforcement, transitioned into the private sector working in large enterprise and consulting. During my tenure in cyber security, I have been fortunate enough to work on complex digital investigations as well as develop training and enablement programs for cyber security defenders all over the world.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2025.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive
Workshop: Intro to Active Directory with Dale Hobbs
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Exploiting AI with Ben Bowman
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: The Hitchhiker’s Guide To Social Engineering with Cameron Cartier
View Course This product has multiple variants. The options may be chosen on the product page