course-premium

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training - CPD & IAO Accredited

Course

Online

Save 83%

Special Emagister price

£ 57 £ 350 VAT inc.

Proper ways of implementing threat modelling, assessing the impact of reconnaissance incidents, and more!

  • Type

    Course

  • Methodology

    Online

  • Class hours

    11h

  • Duration

    Flexible

  • Start date

    Different dates available

The CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training course provides all the necessary information related to cyber-attacks. Throughout the course, you will gain the necessary skills and techniques for minimising the cyber-attacks. You will be prepared for protecting against cyber-attacks.
The course starts with identifying the importance of risk management, assessing risks, mitigating risks, and integrating documentation in risk management. The course teaches you about the classification of cyber threats, threat profiles and the system of performing ongoing treat returns. The course also explains the proper ways of implementing threat modelling, assessing the impact of reconnaissance incidents, and assessing the effects of social engineering. Throughout the course, you will also be able to analyse the attacks on computing and Network environments, examining post-attack techniques and evaluating the organisation’s security posture. Finally, the course shows you how to analyse log data, collecting cyber security intelligence, performing active assets and network analysis, and the proper ways of responding and investing cyber security incidents.
After completing the course, you will be able to analyse threats, secure design computing and network environments. You will also learn the system of proactively defend networks, and able to respond or investigate cybersecurity incidents. To sum up, the course explains the anatomy of cyber-attacks and the procedures of severing an organisation before, during and after an attack or breach.

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

There is no experience or previous qualifications required for enrolment on this course. It is available to all students of all academic backgrounds.

On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Risk
  • Risk Management
  • Computing
  • Windows
  • Linux
  • Network
  • Collecting
  • Engineering
  • Accredited
  • IT risk
  • Network Training

Teachers and trainers (1)

Adams Academy

Adams Academy

Instructor

Course programme

COURSE CURRICULUM

Overview of Wireless Communications

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats

Analyzing Recon Threats to Computing and Network Environments

  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing

Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security

Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics

Evaluating the Organization’s Security Posture

  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

Collecting Cyber security Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files

Analyzing Log Data

  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise – Part 1
  • Analyze Indicators of Compromise – Part 2

Responding to Cyber security Incidents

  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training - CPD & IAO Accredited

Special Emagister price

£ 57 £ 350 VAT inc.