Exam Required for CyberSec First Responder Certification
Lesson 1: Assessing Information Security Risk
• Topic A: Identify the Importance of Risk Management
• Topic B: Assess Risk
• Topic C: Mitigate Risk
• Topic D: Integrate Documentation into Risk Management
Lesson 2: Analyzing the Threat Landscape
• Topic A: Classify Threats and Threat Profiles
• Topic B: Perform Ongoing Threat Research
Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments
• Topic A: Implement Threat Modeling
• Topic B: Assess the Impact of Reconnaissance
• Topic C: Assess the Impact of Social Engineering
Lesson 4: Analyzing Attacks on Computing and Network Environments
• Topic A: Assess the Impact of System Hacking Attacks
• Topic B: Assess the Impact of Web-Based Attacks
• Topic C: Assess the Impact of Malware
• Topic D: Assess the Impact of Hijacking and Impersonation
Attacks
• Topic E: Assess the Impact of DoS Incidents
• Topic F: Assess the Impact of Threats to Mobile Security
• Topic G: Assess the Impact of Threats to Cloud Security
Lesson five: Analyzing Post-Attack Techniques
• Topic A: Assess Command and Control Techniques
• Topic B: Assess Persistence Techniques
• Topic C: Assess Lateral Movement and Pivoting Techniques
• Topic D: Assess Data Exfiltration Techniques
• Topic E: Assess Anti-Forensics Techniques
Lesson 6: Managing Vulnerabilities with inside the Organization
• Topic A: Implement a Vulnerability Management Plan
• Topic B: Assess Common Vulnerabilities
• Topic C: Conduct Vulnerability Scans
Lesson 7: Implementing Penetration Testing to Evaluate Security
• Topic A: Conduct Penetration Tests on Network Assets
• Topic B: Follow Up on Penetration Testing
Lesson 8: Collecting Cybersecurity Intelligence
• Topic A: Deploy a Security Intelligence Collection and
Analysis Platform
• Topic B: Collect Data from Network-Based Intelligence
Sources
• Topic C: Collect Data from Host-Based Intelligence Sources
Lesson 9: Analyzing Log Data
• Topic A: Use Common Tools to Analyze Logs
• Topic B: Use SIEM Tools for Analysis
Lesson 10: Performing Active Asset and Network Analysis
• Topic A: Analyze Incidents with Windows-Based Tools
• Topic B: Analyze Incidents with Linux-Based Tools
• Topic C: Analyze Malware
• Topic D: Analyze Indicators of Compromise
Lesson 11: Responding to Cybersecurity Incidents
• Topic A: Deploy an Incident Handling and Response
Architecture
• Topic B: Contain and Mitigate Incidents
• Topic C: Prepare for Forensic Investigation as a CSIRT
Lesson 12: Investigating Cybersecurity Incidents
•
Topic A: Apply a Forensic Investigation Plan
•
Topic B: Securely Collect and Analyze Electronic
Evidence
•
Topic C: Follow Up at the Results of an
Investigation
This path covers community protection and incident reaction
strategies, processes, and methods are taught in alignment with enterprise
frameworks which include NIST 800-sixty one r.2 (Computer Security Incident
Handling), US-CERT’s NCISP (National Cyber Incident Response Plan), and
Presidential Policy Directive (PPD) forty one on Cyber Incident Coordination
Policy. It is right for applicants who've been tasked with the obligation of
tracking and detecting protection incidents in facts structures and networks,
and for executing standardized responses to such incidents. The path introduces
equipment, processes, and methods to manipulate cybersecurity dangers, perceive
diverse varieties of not unusual place threats, compare the business
enterprise's protection, accumulate and examine cybersecurity intelligence and
remediate and file incidents as they occur. This path offers a complete method
for people chargeable for protecting the cybersecurity in their business
enterprise.
This path is designed to help college students in making
ready for the CyberSec First Responder (Exam CFR-310) certification
examination. What you analyze and exercise on this path may be a large a part
of your instruction.
In addition, this path and next certification (CFR-310)
meets all necessities for employees requiring DOD directive 8570.01-M role
certification baselines:
• CSSP Analyst
• CSSP Infrastructure Support
• CSSP Incident Responder
• CSSP Auditor
141. https://4fqppvb5.wikilentillas.com/7986362/the_benefits_of_cybersec_first_responder_cfr
142. https://sites.google.com/view/cybersecfirstrespondercfr/home
143. https://lookerstudio.google.com/reporting/ec59ec48-dbfd-4f89-88bb-afb20b44fbe6/page/KEuDD
144. https://hackmd.io/foNo59SvTYmdYjRTaqYFGQ
145. https://techplanet.today/post/how-to-cybersec-first-responder-cfr-cybersec-first-responder-cfr
146. https://colab.research.google.com/drive/1ijdwap1SmjKycLqDjDIiz6BQGbjK8qLd?usp=sharing
147. https://groups.google.com/g/education4allcertification/c/_bJkiitmUgw
148. https://investorsconnect.com/read-blog/17985
149. https://community.wongcw.com/blogs/330535/How-to-Have-Fun-with-CyberSec-First-Responder-CFR
No comments:
Post a Comment