Creating a Computer Security Incident Response Team
This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT). This course provides a high-level overview of the key issues and decisions that must be addressed in establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT.
The course is composed of lectures and class exercises. Participants will learn the requirements for establishing an effective CSIRT, the various organizational models for a CSIRT, the variety and level of services that can be provided by a CSIRT, and the types of resources and infrastructure needed to support a team. Additionally, attendees will identify policies and procedures that should be established and implemented when creating a CSIRT.
Attendees may also want to register for the three-day companion course, Managing Computer Security Incident Response Teams, which is scheduled immediately following the Creating a CSIRT course.
- current and prospective CSIRT managers; C-level managers such as CIOs, CSOs, CROs; and project leaders interested in establishing or starting a CSIRT
- other staff who interact with CSIRTs and would like to gain a deeper understanding of how CSIRTs operate. For example, CSIRT constituents; higher-level management; media relations, legal counsel, law enforcement, human resources, audit, or risk management staff
This course will help participants to
- understand the requirements for establishing an effective CSIRT
- strategically plan the development and implementation of a new CSIRT
- highlight issues associated with assembling a responsive, effective team of computer security professionals
- identify policies and procedures that should be established and implemented
- understand various organizational models for a new CSIRT
- understand the variety and level of services that can be provided by a CSIRT
- incident management and the relationship to CSIRTs
- prerequisites to planning a CSIRT
- creating a CSIRT vision
- CSIRT mission, objectives, and level of authority
- CSIRT organizational issues and models
- range and levels of provided services
- funding issues
- hiring and training initial CSIRT staff
- implementing CSIRT policies and procedures
- requirements for a CSIRT infrastructure
- implementation and operational issues and strategies
- collaboration and communication issues
Participants will receive a course notebook, CSIRT action plan, and a downloadable copy of course materials.
This course has no prerequisites.
4 - Day Course
This four-day course, designed for computer security incident response team (CSIRT) and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks. Building on the methods and tools...Learn More
3 - Day Course
In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...Learn More
3 - Day Course
This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle. The course also provides prospective or current managers with...Learn More
Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.