CFR: Threat Detection and Response (Exam CFR-210) Advanced Diploma

Course

Online

Save 92%

Special Emagister price

£ 27 £ 350 VAT inc.

Description

  • Type

    Course

  • Level

    Advanced

  • Methodology

    Online

  • Class hours

    11h

  • Duration

    Flexible

  • Start date

    Different dates available

  • Online campus

    Yes

  • Delivery of study materials

    Yes

  • Support service

    Yes

  • Virtual classes

    Yes

This CFR: Threat Detection and Response (Exam CFR-210) Advanced Diploma will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more.

So, learn to assess and respond to security threats and operate a systems and network security analysis platform by taking this course.

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Risk
  • Computing
  • Windows
  • Networks
  • Linux
  • Network
  • Collecting
  • Systems
  • IT risk
  • Network Training

Teachers and trainers (1)

Alpha Academy

Alpha Academy

Instructor

Course programme

COURSE CURRICULUM

Overview of Wireless Communications

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats

Analyzing Recon Threats to Computing and Network Environments

  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing

Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security

Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics

Evaluating the Organization’s Security Posture

  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

Collecting Cyber security Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files

Analyzing Log Data

  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Analyze Incidents with Linux-Based Tools – Demo 01
  • Analyze Malware
  • Analyze Malware
  • Analyze Indicators of Compromise – Part 1
  • Analyze Indicators of Compromise – Part 2

Responding to Cyber security Incidents

  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation
Mock Exam
  • Mock Exam – CFR: Threat Detection and Response (Exam CFR-210) Advanced Diploma
Final Exam
  • Final Exam – CFR: Threat Detection and Response (Exam CFR-210) Advanced Diploma

CFR: Threat Detection and Response (Exam CFR-210) Advanced Diploma

Special Emagister price

£ 27 £ 350 VAT inc.