Computer Emergency Response Team (CERT) Operations Training
The Computer Emergency Response Team (CERT) Operations training is a free webinar by the Department of Information and Communications Technology (DICT) presented by Engr. Antonio Jimeno Jr., a Cybercrime Consultant. This webinar offers a comprehensive overview of critical cybersecurity topics, including the cyber threat landscape, incident management, vulnerability management, and cyber threat monitoring and prevention. This training aims to equip IT professionals and cybersecurity practitioners with the skills needed to effectively handle and mitigate cyber threats, enhancing their organization’s overall security posture.
Module 1: Cyber Threat Landscape

Proactive Defense: Understanding the landscape is essential for anticipating threats like malware, phishing, and ransomware.
Tailored Security Measures: Recognizing trends allows organizations to adapt their defenses accordingly.
Continuous Research: Staying informed about evolving threats is crucial for effective risk management.
Module 2: Incident Management

Structured Approach: Implementing a coordinated incident response plan (IRP) minimizes damage and recovery time.
Key Components: Focus on preparation, detection, containment, eradication, recovery, and post-incident analysis.
Regular Training: Simulations and training enhance team readiness and improve incident response capabilities.
Module 3: Vulnerability Management

Continuous Process: Identify, assess, and mitigate vulnerabilities regularly to strengthen security posture.
Prioritization: Remediate high-risk vulnerabilities based on potential impact to minimize exploitation risks.
Integration: Combine vulnerability management with patch management and threat intelligence for timely updates.
Module 4: Cyber Threat Monitoring and Prevention

Proactive Monitoring: Use advanced tools like SIEM for real-time visibility into network activity.
Layered Defenses: Employ multiple security measures (firewalls, IDS) to prevent attacks and protect sensitive data.
Regular Updates: Adapt prevention measures based on the latest threat intelligence to maintain security.
Last updated