CyberSec First Responder, Threat Detection and Response
CPD & IAO approved training with tutor support I 60+ Modules I Lifetime Access
St. Pauls College
Summary
- Tutor is available to students
Overview
If you have some basic knowledge of networking technologies, such as TCP/IP, routing protocols, network security and VPNs, then taking this course will be ideal to obtain the skills needed to serve your organisations before, during, and after a cybercrime.
The CFR-210: CyberSec First Responder, Threat Detection and Response is designed to prepare you for protecting the IT infrastructure of the organisations from cyber-attacks.
Study and understand the anatomy of cyber-attacks, including how to execute a properly planned response to such occurrences.
The course also teaches you the tools and techniques to identify the common threats, risks and the mitigation techniques which are applicable globally. In addition to that, you will prepare yourself for analysing threats, plan secure computing and network settings, secure networks proactively, respond to and investigate cybersecurity occurrences.
Key Features of the Course:
- Certification: Internationally recognised certification upon successful completion
- Flexible Study: High quality e-learning study materials, access from any device anytime anywhere
- Instant Result: Instant result through multiple choice assessments
- Lifetime Access: 24/7 access to the course for lifetime
- Comprehensive Training: Delivered by instructors with industry experience, video lessons and texts.
- Support: Premium support through live chat, email and phone
Course media
Description
What will you learn:
The CyberSec First Responder, Threat Detection and Response of 69 mandatory modules, covering
Overview of Wireless Communications
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
Analyzing the Threat Landscape
- Classify Threats and Threat Profiles
- Perform Ongoing Threat Research
- Resources that Aid in Research of Threats
Analyzing Recon Threats to Computing and Network Environments
- Implement Threat Modeling
- Assess the Impact of Reconnaissance Incidents
- Performing Reconnaissance on a Network
- Examining Reconnaissance Incidents
- Assess the Impact of Social Engineering
- Assessing the impact of Social Engineering
- Assessing the Impact of Phishing
Analyzing Attacks on Computing and Network Environments
- Assess the Impact of System Hacking Attacks
- Cracking Passwords Using a Password File
- Assess the Impact of Web Based Attacks
- Assessing the Impact of Web-Based Threats
- Assess the Impact of Malware
- Malware Detection and Removal
- Assess the Impact of Hijacking and Impersonation Attacks
- Assess the Impact of DoS Incidents
- Assessing the Impact of DoS Attacks
- Assess the Impact of Threats to Mobile Security
- Assess the Impact of Threats to Cloud Security
Analyzing Post-Attack Techniques
- Assess Command and Control Techniques
- Assessing Command and Control Techniques
- Assess Persistence Techniques
- Detecting Rootkits
- Assess Lateral Movement and Pivoting Techniques
- Assess Data Exfiltration Techniques
- Steganography
- Assess Anti Forensics Techniques
- Assessing Anti-Forensics
Evaluating the Organization’s Security Posture
- Conduct Vulnerability Assessments
- Perform a Vulnerability Scan with Nessus
- Perform a Vulnerability Scan with MBSA
- Conduct Penetration Tests on Network Assets
- Follow Up on Penetration Testing
Collecting Cyber security Intelligence
- Deploy a Security Intelligence Collection and Analysis Platform
- Collect Data from Network Based Intelligence Sources
- Collecting Network-Based Security Intelligence
- Collect Data from Host Based Intelligence Sources
- Collecting Host-Based Security Intelligence
- Parsing Log files
Analyzing Log Data
- Use Common Tools to Analyze Logs
- Analyzing Linux Logs for Security Intelligence
- Use SIEM Tools for Analysis
- Incorporating SIEMs into Security Intelligence Analysis
- Parse Log Files with Regular Expressions
Performing Active Asset and Network Analysis
- Analyze Incidents with Windows-Based Tools
- Windows-Based Incident Analysis Tools
- Analyze Incidents with Linux Based Tools
- Linux-Based Incident Analysis Tools
- Analyze Malware
- Analyzing Malware
- Analyze Indicators of Compromise
- Analyzing Indicators of Compromise
Responding to Cyber security Incidents
- Deploy an Incident Handling and Response Architecture
- Mitigate Incidents
- Hardening Windows Servers
- DNS Filtering
- Blacklisting and Whitelisting
- Prepare for Forensic Investigation as a CSIRT
Investigating Cyber security Incidents
- Apply a Forensic Investigation Plan
- Securely Collect and Analyze Electronic Evidence
- Securely Collecting Electronic Evidence
- Analyzing Forensic Evidence
- Follow Up on the Results of an Investigation
How is this qualification is delivered?
Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.
These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.
How is the course assessed?
Our CyberSec First Responder, Threat Detection and Response will ensure that you’re fully prepared for the exam. Successful completion of the exam – provided by the authorised awarding body – is a prerequisite to obtaining your qualification.
However you will be able to obtain a course completion certificate from St. Paul's College upon completion of the course.
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.