Managing Computer Security Incident Response Teams
This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team.
The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with an overview of the incident handling process and the types of tools and infrastructure needed to be effective.
Technical issues are discussed from a management perspective. Topics include hiring CSIRT staff, identifying critical information, publishing information, establishing effective working relationships, working with law enforcement, evaluating CSIRT operations, building CSIRT service capacity, and the importance of pre-established policies and procedures.
The course incorporates interactive instruction, exercises, and role playing. During a simulated incident, attendees will gain experience with the type of decisions they might face on a regular basis.
Before attending this course, participants are encouraged to attend the companion course, Creating a Computer Security Incident Response Team. This course is offered the day before the Managing CSIRTs course.
Note: There is some content overlap between the Managing CSIRTs course and the Fundamentals of Incident Handling course. We recommend that attendees register for one course or the other, but not both. The Managing CSIRTs course focuses on incident handling issues from an operational management perspective and discusses best practices in sustaining an effective operation. The Fundamentals of Incident Handling course covers more technical topics such as email and malware attacks. The Fundamentals of Incident Handling course is designed to introduce new incident handlers to the basic skills and processes they will need to perform incident handling work.
- managers who are interested in implementing or are required to implement a CSIRT
- managers who have responsibility or must work with those who do have responsibility for computer security incident and management activities
- managers who have experience in incident handling and want to learn more about operating effective CSIRTs
- other staff who interact with CSIRTs and would like to gain a deeper understanding of how CSIRTs operate. For example, CSIRT constituents; higher-level management; media relations, legal counsel, law enforcement, human resources, audit, or risk management staff.
This course will help participants to
- recognize the importance of establishing well-defined policies and procedures for incident management processes
- identify policies and procedures that should be established and implemented for a CSIRT
- understand incident management activities, including the types of activities and interactions that a CSIRT may perform
- learn about various processes involved in detecting, analyzing, and responding to computer security events and incidents
- identify key components needed for protecting and sustaining CSIRT operations
- manage a responsive, effective team of computer security professionals
- evaluate CSIRT operations and identify performance gaps, risks, and needed improvements
- incident management process
- hiring and mentoring CSIRT staff
- developing CSIRT policies and procedures
- requirements for developing CSIRT services
- handling media issues
- building and managing the CSIRT infrastructure
- coordinating response
- handling major events
- working with law enforcement
- evaluating CSIRT operations
- incident management capability metrics
Participants will receive a course notebook and a downloadable copy of course materials.
This course has no prerequisites; however, prospective attendees may wish to consider attending the Creating a CSIRT one-day class (usually scheduled the day before the Managing CSIRTs course).
4 - Day Course
This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...
3 - Day Course
In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...
1 - Day Course
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can...
5 - Day Course
This five-day course is for computer security incident response team (CSIRT) technical staff who have little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work. It is recommended to those new to incident...
5 - Day Course
This five-day course is designed to provide participants with practical techniques for protecting the security of an organization's information assets and resources, beginning with concepts and proceeding on to technical implementations. The course focuses on understanding and applying the concept of survivability through the effective management...
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.