1.Using a Web browser, search for incident response training. Look through the first five results and identify one or two companies that offer such training. Pick one company and look at the course offerings. Locate a course that can train you to create a CSIRT. How many days will that course take?
2.Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendors Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?
3. Using a Web search tool, identify cases in which private information was disclosed when computer equipment was discarded. Recent examples have included smartphones (like BlackBerry) that were sold without proper data cleansing and hard drives that were sold without data cleansing after the computers they were originally used in were upgraded.