Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

CFR: Reconnaissance, Attack, and Post-Attack Analysis

CertNexus via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics. This is the second course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.

Syllabus

  • Analyzing Reconnaissance Threats to Computing and Network Environments
    • Before threat actors launch their attack in earnest, they gather information. The information available to them is almost always a result of their target's behavior. The attacker simply does their own research, and suddenly they've made their job a lot easier. You need to analyze just what attackers can learn from your organization to get a better picture of what they'll attack, and how.
  • Analyzing Attacks on Computing and Network Environments
    • You've analyzed the general risks and threats to your systems, and you've identified how attackers can gather intelligence on these systems. Now you can begin to analyze the major attacks themselves. There's a wide variety of ways malicious users can compromise your operations, and it's vital you understand the potential effects of each one on the organization.
  • Analyzing Post-Attack Techniques
    • After reconnaissance and attack, the last phase of the threat process is post-attack. In many cases, an attacker won't just withdraw once their attack is done; on the contrary, they'll want to stay in control of the systems they've compromised, continue to evade any countermeasures, and cover their tracks to avoid being identified. All of this means that, if you prematurely terminate your threat assessment efforts, they'll have gone to waste. Instead, you need to hone your focus on what an attacker does after an attack that can inflict long-lasting harm on your organization.
  • Completing the Course
    • You'll wrap things up and then validate what you've learned in this course by taking an assessment.

Taught by

Bill Rosenthal

Reviews

Start your review of CFR: Reconnaissance, Attack, and Post-Attack Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.