title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
CyberSec First Responder CFR (Exam CFR-410)
Course Description
Overview
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST 800.171r2 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents.The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur.
This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines:
- CSSP Analyst
- CSSP Infrastructure Support
- CSSP Incident Responder
- CSSP Auditor
Enrollment in this course includes student digital courseware, labs, and exam voucher for CyberSec First Responder (CFR-410).
Objectives
- Assess cybersecurity risks to the organization
- Analyze the threat landscape
- Analyze various reconnaissance threats to computing and network environments
- Analyze various attacks on computing and network environments
- Analyze various post-attack techniques
- Assess the organization's security posture through auditing, vulnerability management, and penetration testing
- Collect cybersecurity intelligence from various network-based and host-based sources
- Analyze log data to reveal evidence of threats and incidents
- Perform active asset and network analysis to detect incidents
- Respond to cybersecurity incidents using containment, mitigation, and recovery tactics
- Investigate cybersecurity incidents using forensic analysis techniques
Audience
Prerequisites
-
To ensure their success in this course, students should meet the following requirements:
- At least two years (recommended) of experience or education in computer network security technology or a related field
- The ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
- General knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
- Foundation-level skills with some of the common operating systems for computing environments.
- Entry-level understanding of some of the common concepts for network environments, such as routing and switching.
- General or practical knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
- 2 gigahertz (GHz) 64-bit (x64) processor.
- 4 gigabytes (GB) of Random Access Memory (RAM).
- 2 GHz 64-bit processor that supports the VT-x or AMD-V virtualization instruction set and Second Level Address Translation (SLAT).
- 8 GB of RAM. This client will host a Linux® virtual machine.
- 80 GB storage device or larger.
- Monitor capable of a screen resolution of at least 1,024 × 768 pixels, at least a 256-color display, and a video adapter with at least 4 MB of memory.
- Bootable DVD-ROM or USB drive.
- Keyboard and mouse or a compatible pointing device.
- Fast Ethernet (100 Mb/s) adapter or faster and cabling to connect to the classroom network.
- IP addresses that do not conflict with other portions of your network.
- Internet access (contact your local network administrator).
- (Instructor computer only) A display system to project the instructor's computer screen.
- (Optional) A network printer for the class to share.
- Windows Server 2019 and Windows 10 require activation unless you have volume-licensing agreements. There is a grace period for activation. If the duration of your class will exceed the activation grace period (for example, if you are teaching the class over the course of an academic semester), you should activate the installations at some point before the grace period expires. Otherwise, the operating systems may stop working before the class ends.
- The Kali Linux operating system is already installed on a VM that will be loaded in VirtualBox.
- Java Runtime Environment (JRE) version 8u291 (JavaSetup8u291.exe).
- Npcap version 1.50 (npcap-1.50.exe).
- Process Explorer version 16.42 (procexp.exe).
- Splunk® Enterprise version 8.2.1 (splunk-8.2.1-ddff1c41e5cf-x64-release.msi).
- Log Parser version 2.2 (LogParser.msi).
- Log Parser Studio version 2.0 (LPSV2.D2.zip).
- The steps to download these tools are described in the course setup that follows. Note that the URL paths to these downloads may have changed after this course was written. The activities in this course were written to the versions of the software noted previously. If new versions of these tools have been released when you present this course, make sure to test them with their corresponding activities to note any keying discrepancies.
- Oracle® VM VirtualBox version 6.1.16 (VirtualBox-6.1.16-140961-Win.exe).
- Wireshark version 3.4.6 (Wireshark-win64-3.4.6.exe).
- Snort® version 2.9.18 (Snort_2_9_18_Installer.x64.exe).
- icmpsh (icmpsh.zip).
- XAMPP version 7.3.28 (xampp-windows-x64-7.3.28-1-VC15-installer.exe).
- OpenSSH for Windows version 7.1 (setupssh-7.1p2-1.exe).
- PuTTY version 0.76 (putty.exe). LibreOffice Portable version 7.1.4
- (LibreOfficePortable_7.1.4_MultilingualStandard.paf.exe).
- VirtualBox, Wireshark, Snort, and icmpsh are distributed with the course data files under version 2 of the GNU General Public License (GPL). XAMPP is distributed under version 3 of the GNU GPL. OpenSSH for Windows is distributed with the course data files under a Berkeley Software Distribution (BSD) license. PuTTY is distributed with the course data files under the MIT License. LibreOffice is distributed with the course data files under version 2 of the Mozilla Public License (MPL). If you prefer, you can install a version of Microsoft Office instead of using LibreOffice.
Topics
- Topic A: Identify the Importance of Risk Management
- Topic B: Assess Risk
- Topic C: Mitigate Risk
- Topic D: Integrate Documentation into Risk Management
- Topic A: Classify Threats
- Topic B: Analyze Trends Affecting Security Posture
- Topic A: Implement Threat Modeling
- Topic B: Assess the Impact of Reconnaissance
- Topic C: Assess the Impact of Social Engineering
- Topic A: Assess the Impact of System Hacking Attacks
- Topic B: Assess the Impact of Web-Based Attacks
- Topic C: Assess the Impact of Malware
- Topic D: Assess the Impact of Hijacking and Impersonation Attacks
- Topic E: Assess the Impact of DoS Incidents
- Topic F: Assess the Impact of Threats to Mobile Security
- Topic G: Assess the Impact of Threats to Cloud Security
- Topic A: Assess Command and Control Techniques
- Topic B: Assess Persistence Techniques
- Topic C: Assess Lateral Movement and Pivoting Techniques
- Topic D: Assess Data Exfiltration Techniques
- Topic E: Assess Anti-Forensics Techniques
- Topic A: Implement Cybersecurity Auditing
- Topic B: Implement a Vulnerability Management Plan
- Topic C: Assess Vulnerabilities
- Topic D: Conduct Penetration Testing
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
- Topic B: Collect Data from Network-Based Intelligence Sources
- Topic C: Collect Data from Host-Based Intelligence Sources
- Topic A: Use Common Tools to Analyze Logs
- Topic B: Use SIEM Tools for Analysis
- Topic A: Analyze Incidents with Windows-Based Tools
- Topic B: Analyze Incidents with Linux-Based Tools
- Topic C: Analyze Indicators of Compromise
- Topic A: Deploy an Incident Handling and Response Architecture
- Topic B: Mitigate Incidents
- Topic C: Hand Over Incident Information to a Forensic Investigation
- Topic A: Apply a Forensic Investigation Plan
- Topic B: Securely Collect and Analyze Electronic Evidence
- Topic C: Follow Up on the Results of an Investigation
Related Courses
-
Cyber Secure Coder Certified CSC (Exam CSC-210)
CNX0032- Duration: 3
- Delivery Format: Classroom Training, Online Training
- Price: 2,100.00 USD
-
Certified Dark Web Analyst Common Body of Knowledge 5th Edition
035144SE- Duration: 5
- Delivery Format: Classroom Training, Online Training
- Price: 3,500.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.
STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.