Enrolment options
This course will provide you with a structured introduction to incident response. You will discover what incident response is and how key cybersecurity defence actors work together in the field of incident response. After taking the module, you will be able to assess the readiness for incident response in your organization.
Who is this course for? People with an IT background or people interested in learning more about cybersecurity, including from policymaking, law, civil society, private sector and academia. No previous experience in cybersecurity or technical knowledge in incident management is required.
What will you learn? After taking this course, you will be able to:
- explain to a friend or colleague the importance of preparation, policy development, and training for effective incident readiness.
- highlight the different roles and responsibilities of key cybersecurity defense actors, including CERTs and SOCs.
- demonstrate how incident response frameworks and standards guide effective cybersecurity practices, including the National Institute of Standards and Technology (NIST), Common Vulnerability Scoring System (CVSS), Traffic Light Protocol (TLP), and Security Incident Management Maturity Model (SIM3).
- apply standardized tools and models to assess incident response maturity, prioritize threats, and ensure secure information sharing.
How much time do you need to invest? You will need approx. 75 minutes to complete this course.
Topics: Cybersecurity, Incident response, NIST (National Institute of Standards and Technology), Vulnerability, CVSS (Common Vulnerability Scoring System), SIM3 (Security Incident Management Maturity Model), Maturity model, TLP (Traffic Light Protocol), SOC (Security Operations Center), CERT (Computer Emergency Response Team)
Certificate: The platform will automatically generate a certificate of participation once you have completed the course and passed the final test. The passing mark is set at 80%. You will also receive an open badge you can share on professional networks.
Course Developers: GIZ / p-didakt
Course Providers: GIZ
Course Contact: Partnership for Cybersecurity / partnership.cybersecurity@giz.de
License: Creative Commons BY-SA
Publication Date: June 2025 (dead link in module 2 updated in October 2025)