Skip to content

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations


John Academy

Summary

Price
£350 inc VAT
Or £58.33/mo. for 6 months...
Study method
Online
Duration
11 hours · Self-paced
Qualification
No formal qualification
CPD
10 CPD hours / points

Overview

This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more.

So, learn to assess and respond to security threats and operate a systems and network security analysis platform by taking this course.

CPD

10 CPD hours / points
Accredited by CPD QS

Course media

Description

COURSE CURRICULUM

Overview of Wireless Communications

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats

Analyzing Recon Threats to Computing and Network Environments

  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing

Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security

Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics

Evaluating the Organization’s Security Posture

  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

Collecting Cyber security Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files

Analyzing Log Data

  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux-Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise
  • Analyzing Indicators of Compromise

Responding to Cyber security Incidents

  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation

John Academy: A Great Place to Learn for Everyone, Forever

Expert Authors: We select authors with expertise and experience of training professionals. Our authors are industry experts, academics, authors, face-to-face trainers or online trainers; most often they have a combination of these backgrounds

Engaging Content: Our succinct, bite-sized and business-focussed course materials are designed to deliver the most effective training for you. Each course is made up of modules, manageable learning chunks of text, images, videos and tasks.

Why choose us?

  • Study in a user-friendly, advanced online learning platform;
  • All the study materials are available on your student portal including videos tutorials.
  • One of the most successful online education platforms in the UK.
  • Affordable, engaging & high-quality e-learning study materials;
  • You will have unlimited access to online learning platform in 24 hours a day, 7 days a week in 12 Months.
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognised accredited qualification;
  • Access to course content on mobile, tablet or desktop from anywhere anytime;
  • The benefit of applying for NUS Extra Discount Card;
  • 24/7 student support.
  • Technical support and live chat service for your inquiries. This is very helpful for international learners.
  • Excellent and flexible mentor supports our team of experienced tutors/trainers via email.

Assessment:

  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:

  • In addition to the course price, there is an additional charge for the certificate. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at the following price:
  • Hard Copy by post - £39.00
  • Soft Copy PDF via email - £24.00

Who is this course for?

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by International Accreditation Organization (IAO). This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Requirements

Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.