This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-310) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-310) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines:
• CSSP Analyst
• CSSP Infrastructure Support
• CSSP Incident Responder
• CSSP Auditor
This course is delivered as a blend of eLearning and six 4-hour virtual sessions with a certified instructor.
As an aspiring IT Security professional, you must ask yourself which certifications are going to make you the most employable. The simple answer to that question is the one that gives you the skills that employers are looking for. CyberSec First Responder from CertNexus is that certification. It covers all the different job responsibilities and tools that actual IT Security professionals do on a day to day basis. Why spend time taking multiple certifications and studying for multiple exams when you can take CyberSec First Responder and be ready for all roles inside an Incident Response and Analysis team.
In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform.
To ensure your success in this course, you should meet the following requirements:
• At least two years (recommended) of experience or education in computer network security technology or a related field.
• The ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management.
• Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
• General knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
• Foundation-level skills with some of the common operating systems for computing environments.
• Entry-level understanding of some of the common concepts for network environments, such as routing and switching.
• General or practical knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—regardless of size, rank, or budget—understand their role in the cyber defense, incident response, and incident handling process.
PECB's official ISO27001 Lead Implementer training and exam package. Attracts 31 CPD hoursMore Information
PECB's Official ISO 22301 Lead Auditor Training Course. Attracts 31 CPD hoursMore Information
PECB's Official ISO 22301 Lead Implementer Training Course. Attracts 31 CPD hoursMore Information
Attend this CAIP class from our Partners, Logical Operations and take your Artificial Intelligence skills to the next level.More Information
Attend this 2 day Python Programming class from Logical Operations and take your Python skills to the next level.More Information
Attend this 3 day Python class from Logical Operations and take your Python skills to the next level.More Information
This course is delivered as a blend of eLearning and four 4-hour virtual sessions with a certified instructor.More Information
Understand data through descriptive, predicitive, and prescriptive analytics.More Information
This course provides IT leaders, practitioners, support staff and staff interfacing with the organization’s digital and information systems functions with a practical understanding of the key concepts, common language, principles and practices that enables successful management of modern IT-enabled services.More Information
This course is targeted at ITSM leaders, and practitioners who already hold the ITIL v3 Expert qualification (or have 17 points under the ITIL v3 scheme), and it gives them a direct path to transition to the new ITIL 4 Managing Professional (MP) designation.More Information
This course is designed to provide the candidate with an understanding on how to integrate different value streams and activities to create, deliver and support IT-enabled products and services in a holistic way.More Information
This course provides IT leaders, practitioners and support staff with an understanding of all types of engagement and interactions between a service provider and their customers, users, suppliers and partners.More Information
The ITIL 4 Specialist Drive Stakeholder Value course covers all types of engagement and interaction between a service provider and their customers, users, suppliers and partners. It focuses on the conversion of demand into value via IT-enabled services and focuses on the customer journey.More Information
This module explores the ways in which digital organizations and digital operating models function in high velocity environments. It will help aspiring organizations, to operate in a similar way to successful digitally-native organizations.More Information
Lead Disaster Recovery Manager training enables you to develop the necessary expertise to support an organization in implementing, maintaining and managing an ongoing Disaster Recovery Plan. During this training course, you will also gain a comprehensive knowledge of the best practices of Disaster Recovery processes and ICT Disaster Recovery services as part of business continuity management.More Information
The Lead Cloud Security Manager training course enables participants to develop the competence needed to implement and manage a cloud security program by following widely recognized best practices.More Information
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.More Information
The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations.More Information
In today’s business world, information security incidents are considered to be uncertain risks which can seriously damage a business. Thus, organizations must take actions to promptly identify, evaluate and effectively manage the incidents. The ISO/IEC 27035 Information Security Incident Management is an international standard that provides best practices and guidelines for conducting a strategic incident management plan and preparing for an incident response.More Information
Identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program.More Information