Loading...
Deal Detail
CyberSec First Responder: Threat Detection & Response (Exam CFR-210) Online Course
Course Description This series will help students to understand the anatomy of cyber-attacks. Individuals will gain the skills needed to serve their organizations before, during, and after a breach. A CyberSec First Responder is the first line of defense against cyber-attacks. Students will prepare to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents. Career Path: This series is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks. This certification could lead to a job as a security administrator, network administrator, or system administrator. Example Training Video (Not From This Course) Certification Details The exam focuses on the knowledge, ability, and skills necessary to provide for the restoration of information systems. It focuses on restoration within a cybersecurity context including protection, detection, investigation, reaction, response, and auditing capabilities. To learn more about this certification exam Click Here. Vendor: Logical OperationsCertification Exam Details:To purchase courseware, labs, exam vouchers and more, Click Here.Available CEUs for Course Series Completion: 14Students can earn up to 14 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Course Features Expert Lectures Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience. Certificate of Completion Upon completion of a series of courses you can earn a certificate of completion from Learning247. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment. PowerPoint Visuals Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts. DemonstrationsThe immersive demonstrations in our training are a way for the instructor to present how to perform a task on-screen in front of the student. This feature gives the student the power to see tasks performed by a professional in the intended environment as many times as they would like, without purchasing expensive software. Review QuizzesOnce a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores. Final ExamsUpon full completion of a training series, students can take a Series Final Exam, these exams are designed to test the students knowledge on all material trained within a series of courses. Students have the ability to retake any final exam as many times as they wish to ensure they understand the material or to improve upon their score. Mobile AccessWith our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go! WorkbooksEach course comes with a printable workbook that makes it easy to take notes as you learn. They also include a review quiz answer key, complete with answer explanations. Course Outline Course 01 - Assessing Information Security Risk- 1hr 3m Course 02 - Analyzing the Threat Landscape - 23m Course 03 - Analyzing Reconnaissance Threats to Computing and Network Environments - 56m Course 04 - Analyzing Attacks on Computing and Network Environments - 1hr 34m Course 05 - Analyzing Post-Attack Techniques - 1hr 1m Course 06 - Evaluating the Organization’s Security Posture - 53m Course 07 - Collecting Cybersecurity Intelligence - 1hr 14m Course 08 - Analyzing Log Data - 1hr 21m Course 09 - Performing Active Asset and Network Analysis - 1hr 39m Course 10 - Responding to Cybersecurity Incidents - 1hr 12m Course 11 - Investigating Cybersecurity Incidents - 34m Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.

£79.00

Similar Deals

 
Product

Huawei MatePad 10.4 Grey WiFi 32GB Brand New

£229.99

 
Product

Apple iMac (2013) 21.5 Core i5 2.7GHz 1TB 8GB Silver Good

£269.99

 
Product

Apple MacBook Air (2015) 11 Core i7 2.2GHz 256GB 4GB - British ...

£379.99

 
Product

Apple MacBook Pro (2011) 13 Core i5 2.4GHz 500GB 4GB - British ...

£159.99

 
Product

Apple MacBook Pro (2012) 15 Core i7 2.3GHz 500GB 4GB - British ...

£329.99

 
Product

Apple MacBook Air (2015) 13 Core i5 1.6GHz 256GB 8GB - German ...

£379.99

 
Product

Apple MacBook Pro (2013) 13 Core i5 2.4Ghz 256GB 8GB - US ...

£379.99

 
Product

Apple MacBook Air (2017) Core i5 13 1.8GHz 128GB 8GB - British ...

£2490.00