CertNexus Certified CyberSec First Responder (CFR-410)
Description
In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:
- Assess cybersecurity risks to the organization.
 - Analyze the threat landscape.
 - Analyze various reconnaissance threats to computing and network environments.
 - Analyze various attacks on computing and network environments.
 - Analyze various post-attack techniques.
 - Assess the organization's security posture through auditing, vulnerability management, and penetration testing.
 - Collect cybersecurity intelligence from various network-based and host-based sources.
 - Analyze log data to reveal evidence of threats and incidents.
 - Perform active asset and network analysis to detect incidents.
 - Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
 - Investigate cybersecurity incidents using forensic analysis techniques.
 
Lesson 1: Assessing Cybersecurity Risk
- Topic A: Identify the Importance of Risk Management
 - Topic B: Assess Risk
 - Topic C: Mitigate Risk
 - Topic D: Integrate Documentation into Risk Management
 
Lesson 2: Analyzing the Threat Landscape
- Topic A: Classify Threats
 - Topic B: Analyze Trends Affecting Security Posture
 
Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments
- Topic A: Implement Threat Modeling
 - Topic B: Assess the Impact of Reconnaissance
 - Topic C: Assess the Impact of Social Engineering
 
Lesson 4: Analyzing Attacks on Computing and Network Environments
- Topic A: Assess the Impact of System Hacking Attacks
 - Topic B: Assess the Impact of Web-Based Attacks
 - Topic C: Assess the Impact of Malware
 - Topic D: Assess the Impact of Hijacking and Impersonation Attacks
 - Topic E: Assess the Impact of DoS Incidents
 - Topic F: Assess the Impact of Threats to Mobile Security
 - Topic G: Assess the Impact of Threats to Cloud Security
 
Lesson 5: Analyzing Post-Attack Techniques
- Topic A: Assess Command and Control Techniques
 - Topic B: Assess Persistence Techniques
 - Topic C: Assess Lateral Movement and Pivoting Techniques
 - Topic D: Assess Data Exfiltration Techniques
 - Topic E: Assess Anti-Forensics Techniques
 
Lesson 6: Assessing the Organization's Security Posture
- Topic A: Implement Cybersecurity Auditing
 - Topic B: Implement a Vulnerability Management Plan
 - Topic C: Assess Vulnerabilities
 - Topic D: Conduct Penetration Testing
 
Lesson 7: Collecting Cybersecurity Intelligence
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
 - Topic B: Collect Data from Network-Based Intelligence Sources
 - Topic C: Collect Data from Host-Based Intelligence Sources
 
Lesson 8: Analyzing Log Data
- Topic A: Use Common Tools to Analyze Logs
 - Topic B: Use SIEM Tools for Analysis
 
Lesson 9: Performing Active Asset and Network Analysis
- Topic A: Analyze Incidents with Windows-Based Tools
 - Topic B: Analyze Incidents with Linux-Based Tools
 - Topic C: Analyze Indicators of Compromise
 
Lesson 10: Responding to Cybersecurity Incidents
- Topic A: Deploy an Incident Handling and Response Architecture
 - Topic B: Mitigate Incidents
 - Topic C: Hand Over Incident Information to a Forensic Investigation
 
Lesson 11: Investigating Cybersecurity Incidents
- Topic A: Apply a Forensic Investigation Plan
 - Topic B: Securely Collect and Analyze Electronic Evidence
 - Topic C: Follow Up on the Results of an Investigation