We are happy to advise you!
Contact
CyberSec First Responder – Threat Detection and Response (CFRTDR) – Outline
Detailed Course Outline
1 - Assessing Information Security Risk
- Topic A: Identify the Importance of Risk Management
- Topic B: Assess Risk
- Topic C: Mitigate Risk
- Topic D: Integrate Documentation into Risk Management
2 - Analyzing the Threat Landscape
- Topic A: Classify Threats and Threat Profiles
- Topic B: Perform Ongoing Threat Research
3 - Analyzing Reconnaissance Threats to Computing and Network Environments
- Topic A: Implement Threat Modeling
- Topic B: Assess the Impact of Reconnaissance
- Topic C: Assess the Impact of Social Engineering
4 - Analyzing Attacks on Computing and Network Environments
- Topic A: Assess the Impact of System Hacking Attacks
- Topic B: Assess the Impact of Web-Based Attacks
- Topic C: Assess the Impact of Malware
- Topic D: Assess the Impact of Hijacking and Impersonation Attacks
- Topic E: Assess the Impact of DoS Incidents
- Topic F: Assess the Impact of Threats to Mobile Security
- Topic G: Assess the Impact of Threats to Cloud Security
5 - Analyzing Post-Attack Techniques
- Topic A: Assess Command and Control Techniques
- Topic B: Assess Persistence Techniques
- Topic C: Assess Lateral Movement and Pivoting Techniques
- Topic D: Assess Data Exfiltration Techniques
- Topic E: Assess Anti-Forensics Techniques
6 - Managing Vulnerabilities in the Organization
- Topic A: Implement a Vulnerability Management Plan
- Topic B: Assess Common Vulnerabilities
- Topic C: Conduct Vulnerability Scans
7 - Implementing Penetration Testing to Evaluate Security
- Topic A: Conduct Penetration Tests on Network Assets
- Topic B: Follow Up on Penetration Testing
8 - Collecting Cybersecurity Intelligence
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
- Topic B: Collect Data from Network-Based Intelligence Sources
- Topic C: Collect Data from Host-Based Intelligence Sources
9 - Analyzing Log Data
- Topic A: Use Common Tools to Analyze Logs
- Topic B: Use SIEM Tools for Analysis
10 - Performing Active Asset and Network Analysis
- Topic A: Analyze Incidents with Windows-Based Tools
- Topic B: Analyze Incidents with Linux-Based Tools
- Topic C: Analyze Malware
- Topic D: Analyze Indicators of Compromise
11 - Responding to Cybersecurity Incidents
- Topic A: Deploy an Incident Handling and Response Architecture
- Topic B: Contain and Mitigate Incidents
- Topic C: Prepare for Forensic Investigation as a CSIRT
12 - Investigating Cybersecurity Incidents
- Topic A: Apply a Forensic Investigation Plan
- Topic B: Securely Collect and Analyze Electronic Evidence
- Topic C: Follow Up on the Results of an Investigation
13 - Appendix A: Mapping Course Content to CyberSec First Responder™ (Exam CFR-310)
14 - Appendix B: Regular Expressions
15 - Appendix C: Security Resources
16 - Appendix D: U.S. Department of Defense Operational Security Practices