وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CyberSec First Responder (CFR-310)

سرفصل های دوره

It’s time to get ready for the CyberSec First Responder CFR-310 certification exam. Getting certified validates your abilities to deploy and manage network defense and incident response methods, tactics, and procedures according to established industry standards. In this easy-to-follow cert prep course, join experts from ITProTV to get a comprehensive overview of the skills you need to know to go out and crush the CFR-310 exam.

Explore the full scope of effective cybersecurity response: monitoring and detecting security incidents in information systems and networks; executing standardized responses to such incidents; evaluating your organization's security and infrastructure risks; collecting and analyzing relevant cybersecurity intelligence; and remediating and reporting incidents as they occur. Follow along to learn the current best practices for incident response techniques and tools, building your awareness to assess common vulnerabilities and recover from threats and attacks.

Note: This course was created by ITProTV. We are pleased to host this content in our library.


01 - Introduction
  • 01 - CyberSec first responder

  • 02 - 1. Threats and Attacks
  • 01 - Threat targets
  • 02 - Threat actors
  • 03 - Threat motives
  • 04 - Threat intentions
  • 05 - Attack phases
  • 06 - Attack vectors
  • 07 - Technique criteria
  • 08 - Impact of attacks
  • 09 - Footprinting
  • 10 - Network and port scanning
  • 11 - Vulnerability scanning
  • 12 - Penetration testing
  • 13 - Web app scanning
  • 14 - Enumeration

  • 03 - 2. Gaining Access
  • 01 - Exploitation frameworks
  • 02 - Client-side attacks
  • 03 - Server-side attacks
  • 04 - Mobile threats
  • 05 - Web attacks
  • 06 - Password attack
  • 07 - Wireless attacks
  • 08 - Social engineering
  • 09 - Man-in-the-middle
  • 10 - Malware
  • 11 - Out-of-band attacks
  • 12 - Denial-of-service

  • 04 - 3. Post-Exploitation
  • 01 - Command and control
  • 02 - Data exfiltration
  • 03 - Pivoting
  • 04 - Lateral movement
  • 05 - Persistence
  • 06 - Keylogging
  • 07 - Anti-forensics
  • 08 - Cover your tracks

  • 05 - 4. Threat Research and Incident Prep
  • 01 - Threat research and incident prep

  • 06 - 5. Data Collection and Analysis
  • 01 - Network data collection and analysis
  • 02 - Host data collection and analysis
  • 03 - Anomaly detection
  • 04 - Indicators of compromise
  • 05 - Log analysis tools

  • 07 - 6. Incident Response Technique
  • 01 - Containment
  • 02 - Assent discovery
  • 03 - Windows incident response tools
  • 04 - Linux incident response tools
  • 05 - Incident response process
  • 06 - Incident response preparation
  • 07 - Compliance and standards
  • 08 - Framework and best practices
  • 09 - Forensic concepts

  • 08 - 7. Vulnerability Assessments
  • 01 - Commonly vulnerable areas
  • 02 - Vulnerability assessments
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 1703
    حجم: 15124 مگابایت
    مدت زمان: 797 دقیقه
    تاریخ انتشار: 27 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید