Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CertNexus CyberSec First Responder (CFR-310)

EDUTAINMENT COURSE

CertNexus CyberSec First Responder (CFR-310)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

Cybersecurity professionals require a well-rounded understanding of the tools,   processes,  and strategies that can be employed to defend their information systems from constantly evolving threats.   CyberSec First Responder (CFR) is a comprehensive certification designed to validate the knowledge and skills required to protect these critical information systems before,  during,  and after an incident.Analyzing the threat landscape can be a daunting task.  In this episode,  Daniel and Zach will assist you in that effort by classifying the threat targets commonly attacked by threat actors.

Objectives
  • Perform analysis of attacks in the computing and network environments
  • Validating the post-attack techniques
  • Perform vulnerability management in the organization
  • Perform the security evaluation with penetration testing
Prerequisites

• Analyze threats to computing environments.
• Analyze attacks on computing environments.
• Analyze post-attack techniques on computing environments.
• Perform analysis on network assets.
• Investigate cybersecurity incidents.
• Provide remediation and containment suggestions in response to cybersecurity incidents.
• Assess and apply cybersecurity policies and procedures.

Target Audience

Security professionals shouldering the responsibilities of Defensive Cyber Operations (DCO).

Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. THREATS AND ATTACKS
1
Start
Overview
2
Start
Threat Targets
3
Start
Threat Actors
4
Start
Threat Motives
5
Start
Threat Intentions
6
Start
Attack Phases
7
Start
Attack Vectors
8
Start
Technique Criteria
9
Start
Impact Of Attacks
10
Start
Footprinting
11
Start
Network And Port Scanning
12
Start
Vulnerability Scanning
13
Start
Penetration Testing
14
Start
Web App Scanning
15
Start
Enumeration
  1. GAINING ACCESS
16
Start
Exploitation Frameworks
17
Start
Client-Side Attacks
18
Start
Server-Side Attacks
19
Start
Mobile Threats
20
Start
Web Attacks
21
Start
Password Attack
22
Start
Wireless Attacks
23
Start
Social Engineering
24
Start
Man-In-The-Middle
25
Start
Malware
26
Start
Out-Of-Band Attacks
27
Start
Denial Of Service
  1. POST-EXPLOITATION
28
Start
Command And Control
29
Start
Data Exfiltration
30
Start
Pivoting
31
Start
Lateral Movement
32
Start
Persistence
33
Start
Keylogging
34
Start
Anti-Forensics
35
Start
Covering Your Tracks
  1. THREAT RESEARCH AND INCIDENT PREP
36
Start
Threat Research And Incident Prep
  1. DATA COLLECTION AND ANALYSIS
37
Start
Network Data Collection And Analysis
38
Start
Host Data Collection And Analysis
39
Start
Anomaly Detection
40
Start
Indicators Of Compromise
41
Start
Log Analysis Tools
  1. INCIDENT RESPONSE TECHNIQUES
42
Start
Containment
43
Start
Asset Discovery
44
Start
Windows Incident Response Tools
45
Start
Linux Incident Response Tools
46
Start
Incident Response Process
47
Start
Incident Response Preparation
48
Start
Compliance And Standards
49
Start
Frameworks And Best-Practices
50
Start
Forensic Concepts
  1. VULNERABILITY ASSESSMENTS
51
Start
Common Vulnerable Areas
52
Start
Vulnerability Assessments
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 19
  • 8:58:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top