CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will provide the learners with the required knowledge to prevent, detect, and combat cybersecurity threats through continuous security monitoring.
Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations helps the learner to improve their knowledge on the importance of risk management gradually, assessing risks, mitigating risks, and integrating documentation in risk management. The course will thoroughly describe the implementation of threat modeling, how to determine the impact of reconnaissance incidents, effects of social engineering, the ways of examining post-attack techniques, and evaluating the organization’s security posture. The course further discusses the ideas of analyzing log data, collecting cyber intelligence and proper methods to respond to security incidents.
With the completion of the course, learners will be competent to successfully assess and respond to security threats and operating systems and network security analysis platforms.
Course Curriculum
-
Identify the Importance of Risk Management
00:11:00
-
Assess Risk
00:13:00
-
Mitigate Risk
00:22:00
-
Integrate Documentation into Risk Management
00:14:00
-
Classify Threats and Threat Profiles
00:07:00
-
Perform Ongoing Threat Research
00:12:00
-
Resources that Aid in Research of Threats
00:03:00
-
Implement Threat Modeling
00:09:00
-
Assess the Impact of Reconnaissance Incidents
00:10:00
-
Performing Reconnaissance on a Network
00:07:00
-
Examining Reconnaissance Incidents
00:08:00
-
Assess the Impact of Social Engineering
00:10:00
-
Assessing the impact of Social Engineering
00:07:00
-
Assessing the Impact of Phishing
00:03:00
-
Assess the Impact of System Hacking Attacks
00:10:00
-
Cracking Passwords Using a Password File
00:08:00
-
Assess the Impact of Web Based Attacks
00:11:00
-
Assessing the Impact of Web-Based Threats
00:03:00
-
Assess the Impact of Malware
00:08:00
-
Malware Detection and Removal
00:05:00
-
Assess the Impact of Hijacking and Impersonation Attacks
00:13:00
-
Assess the Impact of DoS Incidents
00:09:00
-
Assessing the Impact of DoS Attacks
00:04:00
-
Assess the Impact of Threats to Mobile Security
00:08:00
-
Assess the Impact of Threats to Cloud Security
00:10:00
-
Assess Command and Control Techniques
00:08:00
-
Assessing Command and Control Techniques
00:10:00
-
Assess Persistence Techniques
00:05:00
-
Detecting Rootkits
00:03:00
-
Assess Lateral Movement and Pivoting Techniques
00:13:00
-
Assess Data Exfiltration Techniques
00:04:00
-
Steganography
00:03:00
-
Assess Anti Forensics Techniques
00:09:00
-
Assessing Anti-Forensics
00:03:00
-
Conduct Vulnerability Assessments
00:16:00
-
Perform a Vulnerability Scan with Nessus
00:07:00
-
Perform a Vulnerability Scan with MBSA
00:05:00
-
Conduct Penetration Tests on Network Assets
00:18:00
-
Follow Up on Penetration Testing
00:06:00
-
Deploy a Security Intelligence Collection and Analysis Platform
00:19:00
-
Collect Data from Network Based Intelligence Sources
00:15:00
-
Collecting Network-Based Security Intelligence
00:07:00
-
Collect Data from Host Based Intelligence Sources
00:13:00
-
Collecting Host-Based Security Intelligence
00:15:00
-
Parsing Log files
00:03:00
-
Use Common Tools to Analyze Logs
00:22:00
-
Analyzing Linux Logs for Security Intelligence
00:08:00
-
Use SIEM Tools for Analysis
00:07:00
-
Incorporating SIEMs into Security Intelligence Analysis
00:18:00
-
Parse Log Files with Regular Expressions
00:25:00
-
Analyze Incidents with Windows-Based Tools
00:17:00
-
Windows-Based Incident Analysis Tools
00:19:00
-
Analyze Incidents with Linux Based Tools
00:05:00
-
Linux-Based Incident Analysis Tools
00:07:00
-
Analyze Malware
00:11:00
-
Analyzing Malware
00:03:00
-
Analyze Indicators of Compromise
00:20:00
-
Analyzing Indicators of Compromise
00:15:00
-
Deploy an Incident Handling and Response Architecture
00:22:00
-
Mitigate Incidents
00:16:00
-
Hardening Windows Servers
00:14:00
-
DNS Filtering
00:05:00
-
Blacklisting and Whitelisting
00:09:00
-
Prepare for Forensic Investigation as a CSIRT
00:03:00
-
Apply a Forensic Investigation Plan
00:10:00
-
Securely Collect and Analyze Electronic Evidence
00:08:00
-
Securely Collecting Electronic Evidence
00:05:00
-
Analyzing Forensic Evidence
00:07:00
-
Follow Up on the Results of an Investigation
00:04:00
-
Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
00:20:00
-
Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
00:20:00
14-Day Money-Back Guarantee
-
Duration:12 hours, 7 minutes
-
Access:1 Year
-
Units:71


Want to get everything for £149
Take Lifetime Pack