CyberSec First Responder Certification Training
Level: Intermediate
This CyberSec First Responder Certification course from CertNexus takes a holistic approach to prepare IT Professionals to analyze threats, secure networks, and utilize critical problem-solving skillsets to protect an organization from threats. Focusing on the key areas of detect, analyze and respond, attendees will gain the knowledge and practical skills needed to recover from attacks and thwart potential future threats.
It also prepares you for the new CFR-310 exam and is accredited by ANSI which is a requirement for DoD 8570.
Key Features of this CyberSec First Responder Certification Training
After-course instructor coaching benefit Exam Voucher included with course
You Will Learn How To:
Effectively identify malicious activities involving computing systems.
Assess information security risks in network environments.
Collect cybersecurity intelligence to prepare for assessments.
Develop the skills needed to cut the lag time between when a breach occurs and when it is detected.
Assess the risks and vulnerabilities to perform analysis and determine the scope in an immersive hands-on environment. Effectively protect critical information systems before, during, and after an attack.
Analyze post-attack techniques and apply skills to respond proactively.
Goals Live, Instructor-Led – Live, Online Training
$3290
5-day instructor-led training course
One-on-one after-course instructor coaching
Pay later by invoice -OR- at the time of checkout by credit card
Live, Online Training
CyberSec First Responder Training Information
Who Should Attend
CyberSec First Responder Certification is designed for professionals with 3-5 years working in a computing environment and who desire, or are required, to protect critical information systems.
CyberSec First Responder Training Outline
Lesson 1: Assessing Information Security Risk
Topic A: Identify the Importance of Risk Management
Topic B: Assess Risk
Topic C: Mitigate Risk
Topic D: Integrate Documentation into Risk Management
Lesson 2: Analyzing the Threat Landscape
Topic A: Classify Threats and Threat Profiles
Topic B: Perform Ongoing Threat Research
Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments
Topic A: Implement Threat Modeling
Topic B: Assess the Impact of Reconnaissance
Topic C: Assess the Impact of Social Engineering
Lesson 4: Analyzing Attacks on Computing and Network Environments
Topic A: Assess the Impact of System Hacking Attacks
Topic B: Assess the Impact of Web-Based Attacks
Topic C: Assess the Impact of Malware
Topic D: Assess the Impact of Hijacking and Impersonation Attacks
Topic E: Assess the Impact of DoS Incidents
Topic F: Assess the Impact of Threats to Mobile Security
Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques
Topic A: Assess Command and Control Techniques
Topic B: Assess Persistence Techniques
Topic C: Assess Lateral Movement and Pivoting Techniques
Topic D: Assess Data Exfiltration Techniques
Topic E: Assess Anti-Forensics Techniques
Lesson 6: Managing Vulnerabilities in the Organization
Topic A: Implement a Vulnerability Management Plan
Topic B: Assess Common Vulnerabilities
Topic C: Conduct Vulnerability Scans
Lesson 7: Implementing Penetration Testing to Evaluate Security
Topic A: Conduct Penetration Tests on Network Assets
Topic B: Follow Up on Penetration Testing
Lesson 8: Collecting Cybersecurity Intelligence
Topic A: Deploy a Security Intelligence Collection and Analysis Platform
Topic B: Collect Data from Network-Based Intelligence Sources
Topic C: Collect Data from Host-Based Intelligence Sources Lesson 9: Analyzing Log Data
Topic A: Use Common Tools to Analyze Logs
Topic B: Use SIEM Tools for Analysis
Lesson 10: Performing Active Asset and Network Analysis
Topic A: Analyze Incidents with Windows-Based Tools
Topic B: Analyze Incidents with Linux-Based Tools
Topic C: Analyze Malware
Topic D: Analyze Indicators of Compromise
Lesson 11: Responding to Cybersecurity Incidents
Topic A: Deploy an Incident Handling and Response Architecture
Topic B: Contain and Mitigate Incidents
Topic C: Prepare for Forensic Investigation as a CSIRT
Lesson 12: Investigating Cybersecurity Incidents
Topic A: Apply a Forensic Investigation Plan
Topic B: Securely Collect and Analyze Electronic Evidence
Topic C: Follow Up on the Results of an Investigation
Appendix A: Mapping Course Content to CyberSec First Responder™ (Exam CFR-310)
Appendix B: Regular Expressions
Appendix C: Security Resources
Appendix D: U.S. Department of Defense Operational Security Practices
CyberSec First Responder Certification Training FAQs
Is this CyberSec First Responder certification currently listed on the approved certifications on DoD 8570?
Yes, it is currently approved for CSSP Auditor, CSSP Incident Responder, CSSP Infrastructure Support, CSSP Analyst. The certification is also accredited by ANSI which is a requirement for DOD 8570.
Do I need to have any previous cyber security experience?
Yes, 3-5 years of experience working in an IT environment and familiarity with networks, systems, administration, etc.
Schedule of events In the Classroom — OR — Live, Online
Tuition — Standard: $3290