This program focuses on network defense strategies and incident response methodologies, aligned with industry standards including NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 regarding Cyber Incident Coordination Policy. It is tailored for professionals responsible for monitoring and detecting security events in information systems and networks, as well as executing standardized response protocols. Participants will learn to manage cybersecurity risks, identify common threat types, evaluate organizational security postures, collect and analyze cybersecurity intelligence, and remediate and report incidents effectively. This course offers a comprehensive methodology for individuals tasked with defending their organization's cybersecurity infrastructure.
Designed to aid candidates in preparing for the CertNexus CyberSec First Responder (Exam CFR-310) certification, the skills and practices acquired here form a significant component of your exam preparation. Furthermore, this course and the subsequent CFR-310 certification fulfill all requirements for personnel needing DoD directive 8570.01-M position certification baselines:
• CSSP Analyst
• CSSP Infrastructure Support
• CSSP Incident Responder
• CSSP Auditor
Course Objectives: Throughout this course, you will gain the ability to understand, assess, and respond to security threats while operating a system and network security analysis platform. Specifically, you will:
• Compare and contrast various threats and classify threat profiles
• Explain the purpose and application of attack tools and techniques
• Explain the purpose and application of post-exploitation tools and tactics
• Explain the purpose and application of social engineering tactics
• Given a scenario, conduct ongoing threat landscape research and utilize data to prepare for incidents
• Explain the purpose and characteristics of various data sources
• Given a scenario, employ appropriate tools to analyze logs
• Given a scenario, use regular expressions to parse log files and extract meaningful data
• Given a scenario, use Windows tools to analyze incidents
• Given a scenario, use Linux-based tools to analyze incidents
• Summarize methods and tools used for malware analysis
• Given a scenario, analyze common indicators of potential compromise
• Explain the importance of best practices in incident response preparation
• Given a scenario, execute the incident response process
• Explain the importance of concepts unique to forensic analysis
• Explain general mitigation methods and devices
Target Audience: This course is primarily designed for cybersecurity practitioners who are preparing for or currently performing job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DODIN) operations and incident handling. The course emphasizes the knowledge, abilities, and skills necessary to defend these information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.
Additionally, the course ensures that all IT team members—regardless of size, rank, or budget—understand their role in cyber defense, incident response, and incident handling.
Read more...