top of page
top

CN-CFR-A

CyberSec First Responder – Advanced

cnx-atp-web.jpg

Price
Duration

Please call

5 Days

AI Image2 copy_edited.jpg

Prerequisites

Prerequisits

To ensure your success in this course, you should have taken the CyberSec First Responder® (Exam CFR-410) course and passed the associated exam. This validates you have intermediate skills in working with the Linux® operating system; working at the command line; using fundamental cybersecurity tools like Nmap and Metasploit; and following an incident-response process—all of which are important to this course. And, it ensures you have foundational cybersecurity and networking knowledge

What you'll will learn

What you’ll learn in this course

This course takes cybersecurity practice to the next level. It is an advanced experience that builds upon the defensive skills and knowledge taught by the CyberSec First Responder® (Exam CFR-410) course. It is an applied experience in that it almost entirely consists of hands-on exercises featuring many different tools and environments.

The "A" in CFR-A can also refer to the cybersecurity modes this course is built around:
• Attack: Simulating attacks on computing assets to test security measures and learn more about threat vectors.
• Analyze: Identifying, detecting, and assessing threats to learn more about how they operate and how they affect security.
• Address: Implementing countermeasures and other protections to mitigate the impact of threats to security.

Objectives

Course Objectives

In this course, you will simulate, analyze, and address attacks on computing and network environments. You will:
• Get oriented to your tools and environment.
• Exploit vulnerabilities in software.

• Exploit vulnerabilities related to system access, networking, data, and file configurations.
• Analyze attacks using passive and active methods.
• Implement security protections to minimize the impact of attacks.

Outlines

Course Outline

Lesson 1: Getting Oriented to Your Tools and Environment
• Topic A: Explore the CFR-A Activity Environment
• Topic B: Perform Reconnaissance
• Topic C: Simulate an attack Using Metasploit
Lesson 2: Exploiting Software Vulnerabilities
• Topic A: Exploit Code-Execution and Injection Vulnerabilities
• Topic B: Exploit Web-Application Vulnerabilities
Lesson 3: Exploiting System Vulnerabilities
• Topic A: Exploit Access Vulnerabilities
• Topic B: Exploit Network Vulnerabilities
• Topic C: Exploit Data Vulnerabilities
• Topic D: Exploit File-Configuration Vulnerabilities

Lesson 4: Analyzing Attacks
• Topic A: Analyze Logs for Signs of Attack
• Topic B: Detect Attacks Using Active Monitoring Systems
• Topic C: Perform Digital Forensics
Lesson 5: Protecting Assets
• Topic A: Protect Data
• Topic B: Protect Access
• Topic C: Protect Software
• Topic D: Protect Networks and Systems

Further information

If you would like to know more about this course please contact us

Schedule
cnx-atp-web.jpg
cnx-atp-web.jpg
cnx-atp-web.jpg
For dates in South Africa and Africa region 
Anchor 1

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
Anchor 2
bottom of page