Cybersecurity First Responder

$2,995.00 USD
{price}% OFF

Master the skills of a Cybersecurity Analyst

This is your CyberSecurity Analyst skill set training. In this role, you will monitor and manage networks to protect the security of systems and data. This 40-hour training will arm you with the tools, knowledge, and skills necessary to function in this critical role and prepare you for the CySA certification exam.

Course Schedule
40 Hours | Live Online
Monday-Thursday Evenings,
2 weeks, OR 4 Consecutive Saturdays
Course Difficulty
Level3
Associated Certifications 
CyberSec First Responder (CFR)

People Like You Purchased This Bundle

Full Course Description
To provide you with the knowledge, skills, and abilities to identify, respond to, protect against, and remediate malicious activities involving computer systems. Demonstrate the capacity to handle a changing threat landscape, assess risk and vulnerabilities, acquire and analyze data, determine scope, recommend remediation, and report results.

Threats to networks continue to increase dramatically and the vulnerability of the data on those networks creates intolerable risks for organizations and all their stakeholders, inside and out. Cybersecurity now demands robust teams of skilled professionals within any enterprise to anticipate, guard against, recognize and identify those threats, expeditiously intercept and remediate and repair damage.

The demand for network security professionals has never been higher and is still on the rise. With an ever-expanding surface of attack throughout networks enhanced by cloud and mobility, you can now be part of the growing army of first responders, battling to win the war on cyber crime.
Course Schedule
This course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.
Your New Skill Set
Specifically identify, classify, and remediate threats to an organization, using threat research techniques. Read and interpret vulnerability assessment tools output to identify threats to specific types of technology. Emphasis is placed on the procedural requirements of responding to an incident. Develop the procedural skills  required to conduct effective digital forensic investigations.
High Level Skills You’ll Gain From This Training
Conduct security audits to assess cybersecurity risk & threat landscape
Risk Assessments, Security Updates, and Plan creation
Investigate cybersecurity incidents and respond accordingly
Cybersecurity Incident Response
Reconnaissance Threat analysis through IT infrastructure assessment
Compile cybersecurity information intelligence
Active Asset, Network Analysis
Cybersecurity Attack Analysis
Additional Skills You’ll Build In This Course
Integrating Documentation into Risk Management
Trends Analysis Affecting Security Posture
Assessing Social Engineering impacts
Assessing the Impact of Systems Hacking Attacks, Web-Based Threats, Malware, and DDoS Incidents
Command and Control, Lateral Movement,Pivoting and Anti-Forensics Techniques and Assessing their impact
Completely Erasing Data from a Disk
Managing Vulnerabilities in the Organization
Active Asset and Network Analysis
Analyzing Indicators of Compromise
Developing an Incident Response System
Define appropriate responses from the analysis of collected intel
Performing Network Reconnaissance
Conducting Social Engineering tests
Analyzing Attacks on Computing and Network Environments
Data encryption and hashing
Penetration Testing on Network Assets
Conducting Vulnerability Scans
Collecting Host-Based Security Intelligence
Disabling the Windows Command Prompt
Securely Collecting Electronic Evidence
Recovering Deleted Data
Constructing a Threat Profiles
Recon Incident Examination
Calculating Aggregate CIA scores
Assessing the Impact of Hijacking and Impersonation Attacks
Network-Based Security Intelligence collection
Identifying and Analyzing an Incident using Windows and Linux tools
Containing, Mitigating, and Recovering from Incidents
Tracking Attackers Using Shellbags
And more…