CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training

Course

Online

£ 319 VAT inc.

Description

  • Type

    Course

  • Level

    Advanced

  • Methodology

    Online

  • Duration

    1 Year

  • Start date

    Different dates available

  • Online campus

    Yes

  • Delivery of study materials

    Yes

  • Support service

    Yes

  • Virtual classes

    Yes

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training Course is one of our best selling and most popular course.
The CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training is organized into 12 modules and includes everything you need to become successful in this profession.
To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 12 hours!
If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of 9.99 and PDF Certificate at 4.99.

Earn a free e-certificate upon successful completion.
Accessible, informative modules taught by expert instructors
Study in your own time, at your own pace, through your computer tablet or mobile device
Benefit from instant feedback through mock exams and multiple-choice assessments
Get 24/7 help or advice from our email and live chat teams
Full Tutor Support on Weekdays

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Risk
  • Windows
  • Linux
  • Network
  • Collecting
  • IT risk
  • Network Training
  • Assess
  • Management
  • Importance
  • Analyzing
  • Landscape

Course programme

COURSE CURRICULUM

Overview of Wireless Communications
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
Analyzing the Threat Landscape
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats
Analyzing Recon Threats to Computing and Network Environments
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing
Analyzing Attacks on Computing and Network Environments
  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security
Analyzing Post-Attack Techniques
  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics
Evaluating the Organization’s Security Posture
  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing
Collecting Cyber security Intelligence
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files
Analyzing Log Data
  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions
Performing Active Asset and Network Analysis
  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux-Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise
  • Analyzing Indicators of Compromise
Responding to Cyber security Incidents
  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT
Investigating Cyber security Incidents
  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation
Mock Exam
  • Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training
Final Exam
  • Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training

£ 319 VAT inc.