Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Specialization takes cybersecurity practice to the next level. It is an advanced experience that builds upon the defensive skills and knowledge taught by the CyberSec First Responder® Specialization. It is an applied experience in that it almost entirely consists of hands-on exercises featuring many different tools and environments.
The "A" in CFR-A can also refer to the cybersecurity modes this Specialization is built around:
Attack: Simulating attacks on computing assets to test security measures and learn more about threat vectors.
Analyze: Identifying, detecting, and assessing threats to learn more about how they operate and how they affect security.
Address: Implementing countermeasures and other protections to mitigate the impact of threats to security.
Gaining the knowledge covered in the three courses in this Specialization and passing the final exam in the third course will qualify you for the CertNexus CFR-A credential.
Note: This Specialization requires that you use the provided virtual machines, which include all of the tools and system configurations needed to support the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
Syllabus
- Course 1: CyberSec First Responder – Advanced (CFR-A): Attack
- Course 2: CyberSec First Responder – Advanced (CFR-A): Analyze
- Course 3: CyberSec First Responder – Advanced (CFR-A): Address
Courses
-
To round out your journey into advanced cybersecurity practice, in this course, you'll protect five key aspects of the business environment: data, access, software, networks, and systems. These all contribute to the third and final stage of the overall CFR-A program: Address. This is the third and final course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
-
In this course, you will continue your advanced cybersecurity journey by analyzing logs for signs of attack. You'll also detect attacks using active monitoring systems and perform digital forensics to discover evidence of such attacks. These all contribute to the second stage of the overall CFR-A program: Analyze. This is the second course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.
-
This course will be useful to anyone who is an experienced cybersecurity practitioner and would like to take their skills to the next level. You will begin a multi-stage process by performing reconnaissance and simulating an attack using Metasploit. You'll then exploit code-execution, injection, and web-app vulnerabilities. Lastly, you'll exploit access, network, data, and file-configuration vulnerabilities. These all contribute to the first stage of the overall CFR-A program: Attack. This is the first course in a multi-course Specialization. All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first module of this course go into more detail about the hardware and software requirements.
Taught by
Bill Rosenthal