Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

CyberSec First Responder CFR (Exam CFR-410)

Price
3,500 USD
5
CNX0013
Classroom Training, Online Training
CertNexus Authorized Training Partner - Platinum

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.
 

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

  • Date: 6-Jan-2025 to 10-Jan-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 3-Feb-2025 to 7-Feb-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 3-Mar-2025 to 7-Mar-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 31-Mar-2025 to 4-Apr-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 28-Apr-2025 to 2-May-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 23-Jun-2025 to 27-Jun-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 21-Jul-2025 to 25-Jul-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 18-Aug-2025 to 22-Aug-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 15-Sep-2025 to 19-Sep-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
View Global Schedule

Course Description

Overview

This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST 800.171r2 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents.

The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur.

This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.

In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines:
  • CSSP Analyst
  • CSSP Infrastructure Support
  • CSSP Incident Responder
  • CSSP Auditor


Enrollment in this course includes student digital courseware, labs, and exam voucher for CyberSec First Responder (CFR-410).
 

Objectives

Upon completion of CNX0013 CyberSec First Responder® (Exam CFR-410) course, students will be able to:
  • Assess cybersecurity risks to the organization
  • Analyze the threat landscape
  • Analyze various reconnaissance threats to computing and network environments
  • Analyze various attacks on computing and network environments
  • Analyze various post-attack techniques
  • Assess the organization's security posture through auditing, vulnerability management, and penetration testing
  • Collect cybersecurity intelligence from various network-based and host-based sources
  • Analyze log data to reveal evidence of threats and incidents
  • Perform active asset and network analysis to detect incidents
  • Respond to cybersecurity incidents using containment, mitigation, and recovery tactics
  • Investigate cybersecurity incidents using forensic analysis techniques

Audience

This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—regardless of size, rank, or budget—understand their role in the cyber defense, incident response, and incident handling process.
 

Prerequisites

    To ensure their success in this course, students should meet the following requirements:
    • At least two years (recommended) of experience or education in computer network security technology or a related field
    • The ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management
    • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
    • General knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
    • Foundation-level skills with some of the common operating systems for computing environments.
    • Entry-level understanding of some of the common concepts for network environments, such as routing and switching.
    • General or practical knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
    Course-specific Technical Requirements Technical requirements below are for local class setup only. Hardware For this course, you will need one Microsoft® Windows Server® 2019 computer and one Microsoft® Windows® 10 computer for each student and for the instructor. Make sure that each computer meets the classroom hardware specifications: Windows Server 2019
    • 2 gigahertz (GHz) 64-bit (x64) processor.
    • 4 gigabytes (GB) of Random Access Memory (RAM).
    Windows 10
    • 2 GHz 64-bit processor that supports the VT-x or AMD-V virtualization instruction set and Second Level Address Translation (SLAT).
    • 8 GB of RAM. This client will host a Linux® virtual machine.
    Both Computers
    • 80 GB storage device or larger.
    • Monitor capable of a screen resolution of at least 1,024 × 768 pixels, at least a 256-color display, and a video adapter with at least 4 MB of memory.
    • Bootable DVD-ROM or USB drive.
    • Keyboard and mouse or a compatible pointing device.
    • Fast Ethernet (100 Mb/s) adapter or faster and cabling to connect to the classroom network.
    • IP addresses that do not conflict with other portions of your network.
    • Internet access (contact your local network administrator).
    • (Instructor computer only) A display system to project the instructor's computer screen.
    • (Optional) A network printer for the class to share.
    Software Microsoft Windows Server 2019 Standard Edition with sufficient licenses. Microsoft Windows 10 Professional 64-bit with sufficient licenses.
    • Windows Server 2019 and Windows 10 require activation unless you have volume-licensing agreements. There is a grace period for activation. If the duration of your class will exceed the activation grace period (for example, if you are teaching the class over the course of an academic semester), you should activate the installations at some point before the grace period expires. Otherwise, the operating systems may stop working before the class ends.
    If preferred, a third-party browser such as Google Chrome™ or Mozilla® Firefox®. If preferred, a third-party PDF reader such as Adobe® Acrobat® Reader. Kali Linux version 2021.2.
    • The Kali Linux operating system is already installed on a VM that will be loaded in VirtualBox.
    Miscellaneous software that is not included in the course data files due to licensing restrictions:
    • Java Runtime Environment (JRE) version 8u291 (JavaSetup8u291.exe).
    • Npcap version 1.50 (npcap-1.50.exe).
    • Process Explorer version 16.42 (procexp.exe).
    • Splunk® Enterprise version 8.2.1 (splunk-8.2.1-ddff1c41e5cf-x64-release.msi).
    • Log Parser version 2.2 (LogParser.msi).
    • Log Parser Studio version 2.0 (LPSV2.D2.zip).
      • The steps to download these tools are described in the course setup that follows. Note that the URL paths to these downloads may have changed after this course was written. The activities in this course were written to the versions of the software noted previously. If new versions of these tools have been released when you present this course, make sure to test them with their corresponding activities to note any keying discrepancies.
    Miscellaneous software that is included in the course data files:
    • Oracle® VM VirtualBox version 6.1.16 (VirtualBox-6.1.16-140961-Win.exe).
    • Wireshark version 3.4.6 (Wireshark-win64-3.4.6.exe).
    • Snort® version 2.9.18 (Snort_2_9_18_Installer.x64.exe).
    • icmpsh (icmpsh.zip).
    • XAMPP version 7.3.28 (xampp-windows-x64-7.3.28-1-VC15-installer.exe).
    • OpenSSH for Windows version 7.1 (setupssh-7.1p2-1.exe).
    • PuTTY version 0.76 (putty.exe). LibreOffice Portable version 7.1.4
    • (LibreOfficePortable_7.1.4_MultilingualStandard.paf.exe).
      • VirtualBox, Wireshark, Snort, and icmpsh are distributed with the course data files under version 2 of the GNU General Public License (GPL). XAMPP is distributed under version 3 of the GNU GPL. OpenSSH for Windows is distributed with the course data files under a Berkeley Software Distribution (BSD) license. PuTTY is distributed with the course data files under the MIT License. LibreOffice is distributed with the course data files under version 2 of the Mozilla Public License (MPL). If you prefer, you can install a version of Microsoft Office instead of using LibreOffice.
    If necessary, software for viewing the course slides (instructor machine only).
     

Topics

Lesson 1: Assessing Cybersecurity Risk
  • Topic A: Identify the Importance of Risk Management
  • Topic B: Assess Risk
  • Topic C: Mitigate Risk
  • Topic D: Integrate Documentation into Risk Management
Lesson 2: Analyzing the Threat Landscape
  • Topic A: Classify Threats
  • Topic B: Analyze Trends Affecting Security Posture
Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments
  • Topic A: Implement Threat Modeling
  • Topic B: Assess the Impact of Reconnaissance
  • Topic C: Assess the Impact of Social Engineering
Lesson 4: Analyzing Attacks on Computing and Network Environments
  • Topic A: Assess the Impact of System Hacking Attacks
  • Topic B: Assess the Impact of Web-Based Attacks
  • Topic C: Assess the Impact of Malware
  • Topic D: Assess the Impact of Hijacking and Impersonation Attacks
  • Topic E: Assess the Impact of DoS Incidents
  • Topic F: Assess the Impact of Threats to Mobile Security
  • Topic G: Assess the Impact of Threats to Cloud Security
Lesson 5: Analyzing Post-Attack Techniques
  • Topic A: Assess Command and Control Techniques
  • Topic B: Assess Persistence Techniques
  • Topic C: Assess Lateral Movement and Pivoting Techniques
  • Topic D: Assess Data Exfiltration Techniques
  • Topic E: Assess Anti-Forensics Techniques
Lesson 6: Assessing the Organization's Security Posture
  • Topic A: Implement Cybersecurity Auditing
  • Topic B: Implement a Vulnerability Management Plan
  • Topic C: Assess Vulnerabilities
  • Topic D: Conduct Penetration Testing
Lesson 7: Collecting Cybersecurity Intelligence
  • Topic A: Deploy a Security Intelligence Collection and Analysis Platform
  • Topic B: Collect Data from Network-Based Intelligence Sources
  • Topic C: Collect Data from Host-Based Intelligence Sources
Lesson 8: Analyzing Log Data
  • Topic A: Use Common Tools to Analyze Logs
  • Topic B: Use SIEM Tools for Analysis
Lesson 9: Performing Active Asset and Network Analysis
  • Topic A: Analyze Incidents with Windows-Based Tools
  • Topic B: Analyze Incidents with Linux-Based Tools
  • Topic C: Analyze Indicators of Compromise
Lesson 10: Responding to Cybersecurity Incidents
  • Topic A: Deploy an Incident Handling and Response Architecture
  • Topic B: Mitigate Incidents
  • Topic C: Hand Over Incident Information to a Forensic Investigation
Lesson 11: Investigating Cybersecurity Incidents
  • Topic A: Apply a Forensic Investigation Plan
  • Topic B: Securely Collect and Analyze Electronic Evidence
  • Topic C: Follow Up on the Results of an Investigation
Appendix A: Mapping Course Content to CyberSec First Responder® (Exam CFR-410) Appendix B: Regular Expressions
 
Top 20 Training Industry Company - IT Training

Need Help?

Call us at 877-206-0106 or e-mail us at info@learnquest.com

Personalized Solutions

Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

Contact Us

Need Help?

Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

Talk to us

LearnPass Year-End Offer

Get Up to 25% Additional Training Funds Before the Year Ends!

Act Now

Self-Paced Training Info

Learn at your own pace with anytime, anywhere training

  • Same in-demand topics as instructor-led public and private classes.
  • Standalone learning or supplemental reinforcement.
  • e-Learning content varies by course and technology.
  • View the Self-Paced version of this outline and what is included in the SPVC course.
  • Learn more about e-Learning

Course Added To Shopping Cart

bla

bla

bla

bla

bla

bla

Self-Paced Training Terms & Conditions

??spvc-wbt-warning??

Exam Terms & Conditions

??exam-warning??
??group-training-form-area??
??how-can-we-help-you-area??
??personalized-form-area??
??request-quote-area??

Sorry, there are no classes that meet your criteria.

Please contact us to schedule a class.
Close

self-paced
STOP! Before You Leave

Save 0% on this course!

Take advantage of our online-only offer & save 0% on any course !

Promo Code skip0 will be applied to your registration

Close
Nothing yet
here's the message from the cart

To view the cart, you can click "View Cart" on the right side of the heading on each page
Add to cart clicker.

Purchase Information

??elearning-coursenumber?? ??coursename??
View Cart

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

If you would like to request a quote for 5 or more students, please contact CustomerService@learnquest.com to be assigned an account representative.

Need more Information?

Speak with our training specialists to continue your learning journey.

 

Delivery Formats

Close

By submitting this form, I agree to LearnQuest's Terms and Conditions

heres the new schedule
This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.