عبر الإنترنت
John Academy CyberSec First Responder: Threat Detection John Academy
  • مدة الدورة التدريبية: 12 ساعة إبدأ الآن
  • معتمدة من قبل: CiQCPD Qualification Standards
  • الشهادة:
  • طريقة تقديم الدورة: عبر عرض الفيديو

تفاصيل الدورة

This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more.
So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course.

Overview of Wireless Communications
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Analyzing the Threat Landscape
Classify Threats and Threat Profiles
Perform Ongoing Threat Research
Resources that Aid in Research of Threats
Analyzing Recon Threats to Computing and Network Environments
Implement Threat Modeling
Assess the Impact of Reconnaissance Incidents
Performing Reconnaissance on a Network
Examining Reconnaissance Incidents
Assess the Impact of Social Engineering
Assessing the impact of Social Engineering
Assessing the Impact of Phishing
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks
Cracking Passwords Using a Password File
Assess the Impact of Web Based Attacks
Assessing the Impact of Web-Based Threats
Assess the Impact of Malware
Malware Detection and Removal
Assess the Impact of Hijacking and Impersonation Attacks
Assess the Impact of DoS Incidents
Assessing the Impact of DoS Attacks
Assess the Impact of Threats to Mobile Security
Assess the Impact of Threats to Cloud Security
Analyzing Post-Attack Techniques
Assess Command and Control Techniques
Assessing Command and Control Techniques
Assess Persistence Techniques
Detecting Rootkits
Assess Lateral Movement and Pivoting Techniques
Assess Data Exfiltration Techniques
Steganography
Assess Anti Forensics Techniques
Assessing Anti-Forensics
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments
Perform a Vulnerability Scan with Nessus
Perform a Vulnerability Scan with MBSA
Conduct Penetration Tests on Network Assets
Follow Up on Penetration Testing
Collecting Cyber security Intelligence
Deploy a Security Intelligence Collection and Analysis Platform
Collect Data from Network Based Intelligence Sources
Collecting Network-Based Security Intelligence
Collect Data from Host Based Intelligence Sources
Collecting Host-Based Security Intelligence
Parsing Log files
Analyzing Log Data
Use Common Tools to Analyze Logs
Analyzing Linux Logs for Security Intelligence
Use SIEM Tools for Analysis
Incorporating SIEMs into Security Intelligence Analysis
Parse Log Files with Regular Expressions
Performing Active Asset and Network Analysis
Analyze Incidents with Windows-Based Tools
Windows-Based Incident Analysis Tools
Analyze Incidents with Linux Based Tools
Linux-Based Incident Analysis Tools
Analyze Malware
Analyzing Malware
Analyze Indicators of Compromise
Analyzing Indicators of Compromise
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture
Mitigate Incidents
Hardening Windows Servers
DNS Filtering
Blacklisting and Whitelisting
Prepare for Forensic Investigation as a CSIRT
Investigating Cyber security Incidents
Apply a Forensic Investigation Plan
Securely Collect and Analyze Electronic Evidence
Securely Collecting Electronic Evidence
Analyzing Forensic Evidence
Follow Up on the Results of an Investigation
  تحديث بتاريخ 11 June, 2018

المتطلبات

Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

نبذة عن معهد John Academy

John Academy is best known for offering awarding body accredited online courses that are available for anyone who wishes to acquire a certification and take their professional life to the next level. As an online course provider, we are aware of the fact that there are a lot of people out there who consider themselves to be very curious learners but the courses that they are interested in are not available at their convenient time and place. So, we have decided to give them a unique opportunity for them to learn and obtain necessary skills in a very convenient way at any time from anywhere.

Who We Are

We are an online course provider who wants to make sure that the students would be able to learn everything there is a need for them to learn regarding the course that they have enrolled in on our site. So, we see to it that they would be provided with the highest possible standard of online learning. That way, students would be able to use it in the real world – the employment world and at their desired field of interests.

Certification

After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days.

سجل 598 طالباً في معهد John Academy عبر Laimoon
عرض الجميع دورات John Academy