{"id":2315,"date":"2016-07-12T18:09:45","date_gmt":"2016-07-12T18:09:45","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=2315"},"modified":"2019-07-14T06:51:09","modified_gmt":"2019-07-14T06:51:09","slug":"jntuh-b-tech-4th-year-2-sem-information-technology-r13-4-2-information-security-incident-response-management-security-analyst-iii-elective-ii-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-4th-year-2-sem-information-technology-r13-4-2-information-security-incident-response-management-security-analyst-iii-elective-ii-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 4th Year 2 sem Information Technology R13 (4-2) Information Security Incident Response &amp; Management (Security Analyst -III) (Elective -II) R13 syllabus."},"content":{"rendered":"<p style=\"text-align: justify\">JNTUH B.Tech 4th year (4-2) Information Security Incident Response &amp; Management (Security Analyst -III) gives you detail information of Information Security Incident Response &amp; Management (Security Analyst -III) (Elective -II) R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p style=\"text-align: justify\"><strong>Unit I<\/strong><\/p>\n<p style=\"text-align: justify\">Managing Information Security Services: Configuring Network Devices, Identifying Unauthorized Devices, Testing the Traffic Filtering Devices, Configuring Router, Configuring Modes \u2014 Router\/Global\/Interface\/Line\/Privilege EXEC\/ROM\/User EXEC, Configuring a banner\/Firewall\/Bastion HostNPN server etc.<\/p>\n<p style=\"text-align: justify\"><strong>Unit II<\/strong><\/p>\n<p style=\"text-align: justify\">Troubleshooting Network Devices and Services: Introduction &amp; Methodology of Troubleshooting, Troubleshooting of Network Communication-Connectivity-Network Devices-Network Slowdowns-Systems-Modems etc.<\/p>\n<p style=\"text-align: justify\"><strong>Unit III<\/strong><\/p>\n<p style=\"text-align: justify\">Information Security Incident Management &amp; Data Backup: Information Security Incident Management overview-Handling-Response, Incident Response Roles and Responsibilities, Incident Response Process etc. Data Back introduction, Types of Data Backup and its techniques, Developing an Effective Data Backup Strategy and Plan, Security Policy for Back Procedures.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p style=\"text-align: justify\"><strong>TEXT BOOKS<\/strong><\/p>\n<ul>\n<li style=\"text-align: justify\">Managing Information Security Risks, The Octave Approach by Christopher Alberts, and Audrey Dorofee<\/li>\n<li style=\"text-align: justify\">\u201cCryptography and Network Security (4th Edition) by (Author) William Stallings.\u201d<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>REFERENCES<\/strong><\/p>\n<ul>\n<li style=\"text-align: justify\">httrs:\/\/www.sans.orcl\/readinq-room!whitepapers\u00f1ncident\/securitv-incident-ha ndlinq-small-organizations-32979<\/li>\n<\/ul>\n<p style=\"text-align: justify\">For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 4th year (4-2) Information Security Incident Response &amp; Management (Security Analyst -III) gives you detail information of Information Security Incident Response &amp; Management (Security Analyst -III) (Elective -II) [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-2315","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=2315"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2315\/revisions"}],"predecessor-version":[{"id":17507,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2315\/revisions\/17507"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=2315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=2315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=2315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}