Skip to content

CyberSec First Responder, Threat Detection and Response

CPD & IAO approved training with tutor support I 60+ Modules I Lifetime Access


St. Pauls College

Summary

Price
£470 inc VAT
Or £52.22/mo. for 9 months...
Study method
Online
Duration
Self-paced
Qualification
No formal qualification
Additional info
  • Tutor is available to students

Overview

If you have some basic knowledge of networking technologies, such as TCP/IP, routing protocols, network security and VPNs, then taking this course will be ideal to obtain the skills needed to serve your organisations before, during, and after a cybercrime.

The CFR-210: CyberSec First Responder, Threat Detection and Response is designed to prepare you for protecting the IT infrastructure of the organisations from cyber-attacks.

Study and understand the anatomy of cyber-attacks, including how to execute a properly planned response to such occurrences.

The course also teaches you the tools and techniques to identify the common threats, risks and the mitigation techniques which are applicable globally. In addition to that, you will prepare yourself for analysing threats, plan secure computing and network settings, secure networks proactively, respond to and investigate cybersecurity occurrences.

Key Features of the Course:

  • Certification: Internationally recognised certification upon successful completion
  • Flexible Study: High quality e-learning study materials, access from any device anytime anywhere
  • Instant Result: Instant result through multiple choice assessments
  • Lifetime Access: 24/7 access to the course for lifetime
  • Comprehensive Training: Delivered by instructors with industry experience, video lessons and texts.
  • Support: Premium support through live chat, email and phone

Course media

Description

What will you learn:

The CyberSec First Responder, Threat Detection and Response of 69 mandatory modules, covering

Overview of Wireless Communications

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats

Analyzing Recon Threats to Computing and Network Environments

  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing

Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security

Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics

Evaluating the Organization’s Security Posture

  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

Collecting Cyber security Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files

Analyzing Log Data

  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux-Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise
  • Analyzing Indicators of Compromise

Responding to Cyber security Incidents

  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation

How is this qualification is delivered?

Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.

These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.

How is the course assessed?

Our CyberSec First Responder, Threat Detection and Response will ensure that you’re fully prepared for the exam. Successful completion of the exam – provided by the authorised awarding body – is a prerequisite to obtaining your qualification.

However you will be able to obtain a course completion certificate from St. Paul's College upon completion of the course.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.