By browsing this site, you agree to the use of cookies, which enhance your experience, analyze how you integrate with our site and customize our content to your personal needs and search. Saiba mais
0
Español
Português
Select country:
Antigua & Barbuda
Argentina
Bahamas
Barbados
Belize
Bolivia
Brazil
Chile
Colombia
Costa Rica
Cuba
Dominica
Dominican Republic
Ecuador
El Salvador
Grenada
Guatemala
Guyana
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Puerto Rico
Saint Kitts & Nevis
Saint Lucia
Saint Vincent & Grenadines
Suriname
Trinidad & Tobago
Uruguay
Venezuela
Albania
Austria
Belgium
Bosnia & Herzegovina
Bulgaria
Croatia
Cyprus
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hungary
Iceland
Ireland
Italy
Latvia
Lithuania
Luxembourg
Malta
Montenegro
Netherlands
North Macedonia
Norway
Poland
Portugal
Romania
Serbia
Slovakia
Slovenia
Spain
Sweden
Switzerland
Turkey
Ukraine
United Kingdom
Canada
United States
Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Malaysia
Micronesia
New Zealand
Pakistan
Philippines
Singapore
South Korea
Taiwan
Thailand
Vietnam
Bahrain
Iran
Iraq
Israel
Jordan
Kuwait
Lebanon
Oman
Qatar
Saudi Arabia
Syria
United Arab Emirates
Algeria
Egypt
Kenya
Morocco
Nigeria
Senegal
South Africa
Sudan
Tunisia
We are happy to advise you!
Contact
CyberSec First Responder – Threat Detection and Response (CFRTDR) – Outline
Detailed Course Outline
1 - Assessing Information Security Risk
Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management 2 - Analyzing the Threat Landscape
Topic A: Classify Threats and Threat Profiles Topic B: Perform Ongoing Threat Research 3 - Analyzing Reconnaissance Threats to Computing and Network Environments
Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering 4 - Analyzing Attacks on Computing and Network Environments
Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security 5 - Analyzing Post-Attack Techniques
Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques 6 - Managing Vulnerabilities in the Organization
Topic A: Implement a Vulnerability Management Plan Topic B: Assess Common Vulnerabilities Topic C: Conduct Vulnerability Scans 7 - Implementing Penetration Testing to Evaluate Security
Topic A: Conduct Penetration Tests on Network Assets Topic B: Follow Up on Penetration Testing 8 - Collecting Cybersecurity Intelligence
Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources 9 - Analyzing Log Data
Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis 10 - Performing Active Asset and Network Analysis
Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Malware Topic D: Analyze Indicators of Compromise 11 - Responding to Cybersecurity Incidents
Topic A: Deploy an Incident Handling and Response Architecture Topic B: Contain and Mitigate Incidents Topic C: Prepare for Forensic Investigation as a CSIRT 12 - Investigating Cybersecurity Incidents
Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation 13 - Appendix A: Mapping Course Content to CyberSec First Responder™ (Exam CFR-310) 14 - Appendix B: Regular Expressions 15 - Appendix C: Security Resources 16 - Appendix D: U.S. Department of Defense Operational Security Practices