CertNexus Certified CyberSec First Responder (CFR-410)


Description
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and rem
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Lesson 1: Assessing Cybersecurity Risk |
Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management |
| 2 | Lesson 2: Analyzing the Threat Landscape |
Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture |
| 3 | Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments |
Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering |
| 4 | Lesson 4: Analyzing Attacks on Computing and Network Environments |
Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security |
| 5 | Lesson 5: Analyzing Post-Attack Techniques |
Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques |
| 6 | Lesson 6: Assessing the Organization's Security Posture |
Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing |
| 7 | Lesson 7: Collecting Cybersecurity Intelligence |
Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources |
| 8 | Lesson 8: Analyzing Log Data |
Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis |
| 9 | Lesson 9: Performing Active Asset and Network Analysis |
Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise |
| 10 | Lesson 10: Responding to Cybersecurity Incidents |
Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation |
| 11 | Lesson 11: Investigating Cybersecurity Incidents |
Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation |