CyberSec First Responder Certification Training

Level: Intermediate

This CyberSec First Responder Certification course from CertNexus takes a holistic approach to prepare IT Professionals to analyze threats, secure networks, and utilize critical problem-solving skillsets to protect an organization from threats. Focusing on the key areas of detect, analyze and respond, attendees will gain the knowledge and practical skills needed to recover from attacks and thwart potential future threats.

It also prepares you for the new CFR-310 exam and is accredited by ANSI which is a requirement for DoD 8570.

Key Features of this CyberSec First Responder Certification Training

After-course instructor coaching benefit Exam Voucher included with course

You Will Learn How To:

Effectively identify malicious activities involving computing systems.

Assess information security risks in network environments.

Collect cybersecurity intelligence to prepare for assessments.

Develop the skills needed to cut the lag time between when a breach occurs and when it is detected.

Assess the risks and vulnerabilities to perform analysis and determine the scope in an immersive hands-on environment. Effectively protect critical information systems before, during, and after an attack.

Analyze post-attack techniques and apply skills to respond proactively.

Goals Live, Instructor-Led – Live, Online Training

$3290

5-day instructor-led training course

One-on-one after-course instructor coaching

Pay later by invoice -OR- at the time of checkout by credit card

Live, Online Training

CyberSec First Responder Training Information

Who Should Attend

CyberSec First Responder Certification is designed for professionals with 3-5 years working in a computing environment and who desire, or are required, to protect critical information systems.

CyberSec First Responder Training Outline

Lesson 1: Assessing Information Security Risk

Topic A: Identify the Importance of Risk Management

Topic B: Assess Risk

Topic C: Mitigate Risk

Topic D: Integrate Documentation into Risk Management

Lesson 2: Analyzing the Threat Landscape

Topic A: Classify Threats and Threat Profiles

Topic B: Perform Ongoing Threat Research

Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments

Topic A: Implement Threat Modeling

Topic B: Assess the Impact of Reconnaissance

Topic C: Assess the Impact of Social Engineering

Lesson 4: Analyzing Attacks on Computing and Network Environments

Topic A: Assess the Impact of System Hacking Attacks

Topic B: Assess the Impact of Web-Based Attacks

Topic C: Assess the Impact of Malware

Topic D: Assess the Impact of Hijacking and Impersonation Attacks

Topic E: Assess the Impact of DoS Incidents

Topic F: Assess the Impact of Threats to Mobile Security

Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques

Topic A: Assess Command and Control Techniques

Topic B: Assess Persistence Techniques

Topic C: Assess Lateral Movement and Pivoting Techniques

Topic D: Assess Data Exfiltration Techniques

Topic E: Assess Anti-Forensics Techniques

Lesson 6: Managing Vulnerabilities in the Organization

Topic A: Implement a Vulnerability Management Plan

Topic B: Assess Common Vulnerabilities

Topic C: Conduct Vulnerability Scans

Lesson 7: Implementing Penetration Testing to Evaluate Security

Topic A: Conduct Penetration Tests on Network Assets

Topic B: Follow Up on Penetration Testing

Lesson 8: Collecting Cybersecurity Intelligence

Topic A: Deploy a Security Intelligence Collection and Analysis Platform

Topic B: Collect Data from Network-Based Intelligence Sources

Topic C: Collect Data from Host-Based Intelligence Sources Lesson 9: Analyzing Log Data

Topic A: Use Common Tools to Analyze Logs

Topic B: Use SIEM Tools for Analysis

Lesson 10: Performing Active Asset and Network Analysis

Topic A: Analyze Incidents with Windows-Based Tools

Topic B: Analyze Incidents with Linux-Based Tools

Topic C: Analyze Malware

Topic D: Analyze Indicators of Compromise

Lesson 11: Responding to Cybersecurity Incidents

Topic A: Deploy an Incident Handling and Response Architecture

Topic B: Contain and Mitigate Incidents

Topic C: Prepare for Forensic Investigation as a CSIRT

Lesson 12: Investigating Cybersecurity Incidents

Topic A: Apply a Forensic Investigation Plan

Topic B: Securely Collect and Analyze Electronic Evidence

Topic C: Follow Up on the Results of an Investigation

Appendix A: Mapping Course Content to CyberSec First Responder™ (Exam CFR-310)

Appendix B: Regular Expressions

Appendix C: Security Resources

Appendix D: U.S. Department of Defense Operational Security Practices

CyberSec First Responder Certification Training FAQs

Is this CyberSec First Responder certification currently listed on the approved certifications on DoD 8570?

Yes, it is currently approved for CSSP Auditor, CSSP Incident Responder, CSSP Infrastructure Support, CSSP Analyst. The certification is also accredited by ANSI which is a requirement for DOD 8570.

Do I need to have any previous cyber security experience?

Yes, 3-5 years of experience working in an IT environment and familiarity with networks, systems, administration, etc.

Schedule of events In the Classroom — OR — Live, Online

Tuition — Standard: $3290