This course uses blended learning methods that include a balance of classroom lecture, hands-on laboratory exercises and the use of cyberterrorism response tools against real world simulated cyber-attacks. Students learn the proper steps of an incident response to include incident assessment, detection and analysis, and
the containing, eradicating, and recovering process from a system or network-based attack.
At the end of the course, the participants will be able to:
● define steps for handling cybersecurity attacks,
including incident assessment, detection and analysis
for security incidents, and containing, eradicating and
recovering from a system or network-based attack;
● Identify, define and practice with tools and resources
required in the cybersecurity incident response
process in order to accurately and successfully detect,
analyze and mitigate a cyberattack; and
● define the proper techniques used to properly review,
| Details |
| Date(s) |
Mon. Feb 23, 2026 0800-1700
Tue. Feb 24, 2026 0800-1700
Wed. Feb 25, 2026 0800-1700
Thu. Feb 26, 2026 0800-1700
|
| Location |
University of North Carolina at Pembroke 209 N. Odum St., Pembroke NC 28372
Google Map
|
| Handicap Accessibility |
No
|
| WiFi Access |
|
| Offered By |
University of North Carolina at Pembroke |
| Primary Instructor |
FED, Direct Delivery |
| Course Length |
4 |
| Course Hours |
32.00 |
| CEUs |
|
| Award Credentials |
|
| Prerequisites |
|
| Equivalent Prerequisites |
|
| Maximum Participants |
50 |
| # Open Seats |
48 |
| # on Wait List |
0 |
| Attachments |
Course Flyer
|