CyberSec First Responder: Threat Detection and Response (CFR) [GK2180]
Starting dates and places
computer Online: VIRTUAL TRAINING CENTER 10 Feb 2025 until 14 Feb 2025 |
computer Online: VIRTUAL TRAINING CENTER 19 May 2025 until 23 May 2025 |
computer Online: VIRTUAL TRAINING CENTER 18 Aug 2025 until 22 Aug 2025 |
computer Online: VIRTUAL TRAINING CENTER 17 Nov 2025 until 21 Nov 2025 |
Description
OVERVIEW
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
OVERVIEW
OBJECTIVES
- Assess information security risk in computing and network environments
- Create an information assurance lifecycle process
- Analyze threats to computing and network environments
- Design secure computing and network environments
- Operate secure computing and network environments
- Assess the security posture within a risk management framework
- Collect cybersecurity intelligence information
- Analyze collected intelligence to define actionable response
- Respond to cybersecurity incidents
- Investigate cybersecurity incidents
- Audit secure computing and network environments
AUDIENCE
Cybersecurity practitioners who perform job functions related to protecting and defending information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiationCONTENT
- 1. Assessing Information Security Risk
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
- 2. Creating an Information Assurance Lifecycle Process
- Evaluate Information Assurance Lifecycle Models
- Align Information Security Operations to the Information Assurance Lifecycle
- Align Information Assurance and Compliance Regulations
- 3. Analyzing Threats to Computing and Network Environments
- Identify Threat Analysis Models
- Assess the Impact of Reconnaissance Incidents
- Assess the Impact of Systems Hacking Attacks
- Assess the Impact of Malware
- Assess the Impact of Hijacking and Impersonation Attacks
- Assess the Impact of DoS Incidents
- Assess the Impact of Threats to Mobile Security
- Assess the Impact of Threats to Cloud Security
- 4. Designing Secure Computing and Network Environments
- Information Security Architecture Design Principles
- Design Access Control Mechanisms
- Design Cryptographic Security Controls
- Design Application Security
- Design Computing Systems Security
- Design Network Security
- 5. Operating Secure Computing and Network Environments
- Implement Change Management in Security Operations
- Implement Monitoring in Security Operations
- 6. Assessing the Security Posture Within a Risk Management Framework
- Deploy a Vulnerability Management Platform
- Conduct Vulnerability Assessments
- Conduct Penetration Tests on Network Assets
- Follow Up on Penetration Testing
- 7. Collecting Cybersecurity Intelligence Information
- Deploy a Security Intelligence Collection and Analysis Platform
- Collect Data from Security Intelligence Sources
- 8. Analyzing Cybersecurity Intelligence Information
- Analyze Security Intelligence to Address Incidents
- Use SIEM Tools for Analysis
- 9. Responding to Cybersecurity Incidents
- Deploy an Incident Handling and Response Architecture
- Perform Real-Time Incident Handling Tasks
- Prepare for Forensic Investigation
- 10. Investigating Cybersecurity Incidents
- Create a Forensic Investigation Plan
- Securely Collect Electronic Evidence
- Identify the Who, Why, and How of an Incident
- Follow Up on the Results of an Investigation
- 11. Auditing Secure Computing and Network Environments
- Deploy a Systems and Processes Auditing Architecture
- Prepare for Audits
- Perform Audits Geared Toward the Information Assurance Lifecycle
- Labs
- Lab 1: Implementing a Threat Assessment Model
- Lab 2: Examining Reconnaissance Incidents
- Lab 3: Assessing the Impact of System Hijacking Attempts
- Lab 4: Assessing the Impact of Malware
- Lab 5: Assessing the Impact of Hijacking and Impersonation attacks
- Lab 6: Assessing the Impact of DoS Incidents
- Lab 7: Assessing the Impact of Threats to Mobile Devices
- Lab 8: Designing Cryptographic Security Controls
- Lab 9: Designing Application Security
- Lab 10: Implementing Monitoring in Security Operations
- Lab 11: Deploying a Vulnerability Management Platform
- Lab 12: Conducting Vulnerability Assessments
- Lab 13: Conducting Penetration Testing on Network Assets
- Lab 14: Collecting and Analyzing Security Intelligence
- Lab 15: Collecting Security Intelligence Data
- Lab 16: Capturing and Analyzing Baseline Data
- Lab 17: Analyzing Security Intelligence
- Lab 18: Incorporating SIEMS into Security Intelligence Analysis
- Lab 19: Developing an Incidence Response System
- Lab 20: Securely Collecting Electronic Evidence
- Lab 21: Analyzing Forensic Evidence
- Lab 22: Preparing for an Audit
- Lab 23: Performing Audits
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.