Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Specialization covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST SP 800-61r2, US-CERT's National Cyber Incident Response Plan (NCIRP), and NIST SP 800-171r2. It is ideal for those who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur.
This Specialization is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination.
Note: This Specialization requires that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60.
Syllabus
- Course 1: CFR: Risk and Threat Analysis
- Course 2: CFR: Reconnaissance, Attack, and Post-Attack Analysis
- Course 3: CFR: Security Assessment, Data Collection, and Log Analysis
- Course 4: CFR: Incident Analysis, Response, and Forensics
Courses
-
To round out your skills as a cybersecurity practitioner, you'll analyze incidents and indicators of compromise (IOCs) using Windows- and Linux-based tools. Then, you'll deploy an incident handling and response architecture, mitigate incidents, and hand over incident information to forensic personnel. Lastly, you'll investigate cybersecurity incidents by applying a forensic investigation plan, securely collecting and analyzing electronic evidence, and following up on the results of an investigation. This is the fourth and final course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.
-
In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics. This is the second course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.
-
This course will be useful to cybersecurity practitioners who are preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. You will begin by identifying the importance of risk management and assessing and mitigating risk to the organization. You'll also analyze the threat landscape by classifying threats and identifying trends that affect the organization's security posture. This is the first course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in this course for 25% off, the labs cost approximately $60.
-
In this course, you'll continue developing your cybersecurity skills by implementing cybersecurity auditing, implementing a vulnerability management plan, assessing vulnerabilities, and conducting penetration testing. Then, you'll collect cybersecurity intelligence from both network-based and host-based sources. You'll also analyze log data using common Windows and Linux tools, as well as security information and event management (SIEM) tools. This is the third course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.
Taught by
Bill Rosenthal