Cyber Security: First Responder

£5250.00

INTRODUCTION

The CyberSec First Responder (CFR) training course is designed to cover network defence and incident response methods, tactics, and procedures aligned with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST 800.171r2 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organisations). It is ideal for individuals responsible for monitoring and detecting security incidents in information systems and networks, as well as for executing standardised responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organisation's security, collect and analyse cybersecurity intelligence, and remediate and report incidents as they occur. This comprehensive methodology equips individuals with the skills to effectively defend their organisation's cybersecurity.

This training course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. The knowledge and practices acquired in this training course are a significant part of the certification preparation.

Specific prerequisites are mandatory to ensure success in this course. The program prerequisites can be accessed and viewed by visiting the following hyperlinked file: CFR Prerequisites, and CertNexus Exam Blueprints.

TRAINING OBJECTIVES

In this training course, you will:

  • Assess cybersecurity risks to the organisation.

  • Analyse the threat landscape.

  • Analyse various reconnaissance threats to computing and network environments.

  • Analyse various attacks on computing and network environments.

  • Analyse various post-attack techniques.

  • Assess the organisation's security posture through auditing, vulnerability management, and penetration testing.

  • Collect cybersecurity intelligence from various network-based and host-based sources.

  • Analyse log data to reveal evidence of threats and incidents.

  • Perform active asset and network analysis to detect incidents.

  • Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.

  • Investigate cybersecurity incidents using forensic analysis techniques.

WHO SHOULD ATTEND?

This course is primarily designed for cybersecurity practitioners preparing for or currently performing job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those in federal contracting companies and private sector firms whose missions or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. The course focuses on the knowledge, ability, and skills necessary to provide defence for information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.

Additionally, the course ensures that all members of an IT team—regardless of size, rank, or budget—understand their role in the cyber defense, incident response, and incident handling process.

TRAINING OUTLINE

Day One: Assessing Cybersecurity Risk

  • Identify the Importance of Risk Management

  • Assess Risk

  • Mitigate Risk

  • Integrate Documentation into Risk Management

Day Two: Analysing the Threat Landscape

  • Classify Threats

  • Analyse Trends Affecting Security Posture

Day Three: Analysing Reconnaissance Threats to Computing and Network Environments

  • Implement Threat Modelling

  • Assess the Impact of Reconnaissance

  • Assess the Impact of Social Engineering

Day Four: Analysing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks

  • Assess the Impact of Web-Based Attacks

  • Assess the Impact of Malware

  • Assess the Impact of Hijacking and Impersonation Attacks

  • Assess the Impact of DoS Incidents

  • Assess the Impact of Threats to Mobile Security

  • Assess the Impact of Threats to Cloud Security

Day Five: Analysing Post-Attack Techniques

  • Assess Command and Control Techniques

  • Assess Persistence Techniques

  • Assess Lateral Movement and Pivoting Techniques

  • Assess Data Exfiltration Techniques

  • Assess Anti-Forensics Techniques

  • Assessing the Organisation's Security Posture

  • Implement Cybersecurity Auditing

  • Implement a Vulnerability Management Plan

  • Assess Vulnerabilities

  • Conduct Penetration Testing

Format: On-site and Online

Language(s): English and Arabic 

Duration: One Week

Certificate of Completion: Upon successful completion of the program, participants will receive an Al-Majd Pathways Centre (APC) Certificate of Completion.