🚨 Cybersecurity Track

Incident Response Playbook

Create a comprehensive IR playbook documenting detection, containment, eradication, and recovery procedures.

⏱️ 6-8 hours 🎯 Intermediate

📋 Overview

When a breach happens, you don't rise to the occasion—you fall to your level of training. This project requires you to document IR procedures for common scenarios.

🔨 Playbook Structure

Scenario 1: Ransomware Outbreak

Detection: EDR alert + mass file encryption

Containment: Isolate affected hosts from network

Eradication: Wipe & reimage compromised systems

Recovery: Restore from backups, validate integrity

Scenario 2: Credential Compromise

Detection: Impossible travel / MFA fatigue

Containment: Revoke sessions, force password reset

Investigation: Review access logs for lateral movement

Scenario 3: Data Exfiltration

Detection: DLP alert / unusual egress traffic

Forensics: Packet capture + log analysis

Notification: Legal, PR, affected customers (GDPR)

📦 Deliverables