Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

LDR553: Cyber Incident Management

LDR553Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Steve Armstrong-Godwin
Steve Armstrong-Godwin
LDR553: Cyber Incident Management
Course created by:
Steve Armstrong-Godwin
Steve Armstrong-Godwin
  • GIAC Cyber Incident Leader (GCIL)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 28 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Develop essential leadership skills to effectively manage cyber incidents from discovery to resolution, providing clear direction when your organization needs it most.

Course Overview

While technical teams work to identify and remove attackers, they require strategic direction, management, and support to maximize their effectiveness. Cyber Incident Management focuses on the critical non-technical challenges facing leaders during high-pressure security incidents.

This course equips you to lead incident management teams by providing a comprehensive understanding of immediate, short, and medium-term challenges organizations face during security breaches. You will learn to build and manage teams, distill critical data for briefings, and communicate effectively with executives, board members, and other stakeholders. Through nine detailed case studies, you will gain hands-on experience in incident management methodology and practices applicable to various cybersecurity scenarios.

What You'll Learn

  • Lead crisis communications with executives and teams
  • Manage incident teams under extreme pressure situations
  • Develop comprehensive remediation plans and strategies
  • Coordinate effective responses to complex ransom scenarios
  • Leverage AI and threat intelligence for incident support
  • Deliver clear, impactful briefings to executives and boards
  • Manage the transition from active incident to normal operations

Business Takeaways

  • Develop expert cyber incident management capabilities
  • Accelerate incident resolution with streamlined processes
  • Bridge security gaps with comprehensive response plans
  • Improve team performance during critical incidents
  • Navigate high-stakes attacks with strategic resilience
  • Enhance technical and non-technical team collaboration
  • Integrate threat intelligence to anticipate threats

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR553: Cyber Incident Management.

Section 1Understanding and Communicating About the Incident

Section 1 focuses on understanding incidents, standardizing language, and defining objectives. You will gather information, set clear goals for the Incident Management team, and assign initial responsibilities. This section introduces the Cyber Incident Management Tool Kit (CIMTK) and explores team composition and stakeholder communication strategies.

Topics covered

  • Initial Information Gathering
  • Defining your Objectives
  • Who's on our Team?
  • Building our Communications Plan

Labs

  • Setting up for the labs
  • Reviewing the initial incident briefing
  • The Cyber Incident Management Tool Kit
  • Setting the IM Objectives and Priorities
  • Crisis Communications with Executives

Section 2Scoping the Damage, Planning the Remediation, and Executing the Plan

Section 2 explores interactions with attackers and remediation strategies. You will learn approaches that can buy time to address issues and prevent data leaks. You will categorize network and data damage, prioritize remediation tasks, and eliminate vulnerabilities, developing skills to create comprehensive incident reports and conduct Root Cause Analysis.

Topics covered

  • Talking to or working with attackers
  • Tracking incidents and progress
  • Remediating network damage
  • Utilizing Root Cause Analysis (RAC) methods
  • Reporting and documenting cases

Labs

  • Dealing with the Attackers
  • Drafting a Public Statement
  • Crafting Crisis Communications
  • Planning Data and System Remediation
  • Conducting Root Cause Analysis (RAC)

Section 3Training, Leveraging Cyber Threat Intelligence, Bug Bounties

Section 3 explores training incident response teams and the broader organization. You will learn to develop effective training programs based on organizational maturity and specific needs. We examine integrating Cyber Threat Intelligence (CTI) into incident response efforts and developing strategies for managing supply chain and third-party compromises.

Topics covered

  • Developing the wider team
  • Analyzing training needs
  • Developing the SOC/IR/IM team
  • Leveraging Cyber Threat Intelligence
  • Third-Party Supply Chain Compromise

Labs

  • Choosing Cyber Training Exercises
  • Exercise for non-IM specialists
  • Planning a Hotseat exercise
  • Requests For Intelligence (RFI)
  • Third-Party Supply Chain exercises

Section 4Cloud Incidents, Business Email Compromise, Credential Theft Attacks and Incident Metrics

In section 4 you will gain a comprehensive view, visualizing incident timelines and addressing complex attack scenarios. You will learn to create timelines tailored to different audiences, understand credential theft attacks and the MITRE framework, and explore Business Email Compromise (BEC), as well as cloud-based attacks and management console breaches.

Topics covered

  • Timelines for Visualization
  • Defining Cloud Attacks
  • Credential Theft Attacks
  • Business Email Compromise (BEC)
  • Cloud Assets and Management Console Attacks

Labs

  • Reviewing Incident Timelines
  • Credential Loss Impact Assessment
  • BEC attack response
  • Cloud Management attack response

Section 5AI for Incidents, Attacker Extortion, Ransomware, and Capstone Exercise

Section 5 teaches best practices in advanced incident management challenges and emerging threats. You will explore team improvement, KPIs, and efficacy metrics. The section examines AI applications, including Large Language Models and Generative AI. You will gain in-depth knowledge of ransomware incidents and participate in a comprehensive capstone exercise.

Topics covered

  • Improving IR/IM
  • Leveraging AI for IM
  • Ransomware
  • Summary and review
  • Capstone Exercise

Labs

  • Updating the public statement
  • Leveraging AI and LLM in IM
  • Reviewing Ransomware cases
  • Capstone exercise

Things You Need To Know

Relevant Job Roles

Cyber Incident Responder

European Cybersecurity Skills Framework

Monitor the organisation’s cybersecurity state, handle incidents during cyber-attacks and assure the continued operations of ICT systems.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Communications Security (COMSEC) Management (OPM 723)

NICE: Oversight and Governance

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.

Explore learning path

Title

Industrial Control Systems Security

gg

Explore learning path

Executive Cybersecurity Leadership (OPM 901)

NICE: Oversight and Governance

Responsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.

Explore learning path

Cybersecurity Policy and Planning (OPM 752)

NICE: Oversight and Governance

Responsible for developing and maintaining cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by first-name.742312 last-name.742312
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Munich, DE

    Instructed by first-name.742312 last-name.742312
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by first-name.742312 last-name.742312
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by first-name.742312 last-name.742312
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,715 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by first-name.742312 last-name.742312
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,715 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by first-name.2680897 last-name.2680897
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by first-name.2680897 last-name.2680897
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by first-name.742312 last-name.742312
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 18

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources