Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Cybersec First Responder (CFR)

(CFR-310.AK1) / ISBN: 978-1-64459-206-9
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
CFR-310.AK1 : Cybersec First Responder (CFR)
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Cybersec First Responder (CFR)

Get certified for the CertNexus CFR certification exam with the CyberSec First Responder (CFR) course and lab. The lab provides a hands-on learning experience in a safe, online environment. The CFR training course and lab cover the CFR-310 exam objectives and provide the required knowledge required to deal with a changing threat landscape. After completing the course, you will be able to assess risk and vulnerabilities, acquire data, perform analysis, continuously communicate, recommend remediation actions, and accurately report results.
Here's what you will get

Cybersecurity professionals work with the tools, processes, and strategies that are incorporated to defend their information systems from evolving threats. CyberSec First Responder (CFR) certification validates that the candidate has the knowledge and skills required to protect these critical information systems before, during, and after an incident. The CFR certification exam is accredited under the ANSI/ISO/IEC 17024 standard and is approved by the U.S. Department of Defense (DoD) to fulfill Directive 8570/8140 requirements.

Lessons
  • 17+ Lessons
  • 121+ Quizzes
  • 362+ Flashcards
  • 381+ Glossary of terms
TestPrep
  • 50+ Pre Assessment Questions
  • 1+ Full Length Tests
  • 100+ Post Assessment Questions
  • 100+ Practice Test Questions
LiveLab
  • 42+ LiveLab
  • 31+ Video tutorials
  • 53+ Minutes
Video Lessons
  • 12+ Videos
  • 39+ Minutes
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
  • Course Description
  • Course-Specific Technical Requirements
  • How to Use This Course
Lesson 2: Assessing Information Security Risk
  • Topic A: Identify the Importance of Risk Management
  • Topic B: Assess Risk
  • Topic C: Mitigate Risk
  • Topic D: Integrate Documentation into Risk Management
  • Summary
Lesson 3: Analyzing the Threat Landscape
  • Topic A: Classify Threats and Threat Profiles
  • Topic B: Perform Ongoing Threat Research
  • Summary
Lesson 4: Analyzing Reconnaissance Threats to Computing and Network Environments
  • Topic A: Implement Threat Modeling
  • Topic B: Assess the Impact of Reconnaissance
  • Topic C: Assess the Impact of Social Engineering
  • Summary
Lesson 5: Analyzing Attacks on Computing and Network Environments
  • Topic A: Assess the Impact of System Hacking Attacks
  • Topic B: Assess the Impact of Web-Based Attacks
  • Topic C: Assess the Impact of Malware
  • Topic D: Assess the Impact of Hijacking and Impersonation Attacks
  • Topic E: Assess the Impact of DoS Incidents
  • Topic F: Assess the Impact of Threats to Mobile Security
  • Topic G: Assess the Impact of Threats to Cloud Security
  • Summary
Lesson 6: Analyzing Post-Attack Techniques
  • Topic A: Assess Command and Control Techniques
  • Topic B: Assess Persistence Techniques
  • Topic C: Assess Lateral Movement and Pivoting Techniques
  • Topic D: Assess Data Exfiltration Techniques
  • Topic E: Assess Anti-Forensics Techniques
  • Summary
Lesson 7: Managing Vulnerabilities in the Organization
  • Topic A: Implement a Vulnerability Management Plan
  • Topic B: Assess Common Vulnerabilities
  • Topic C: Conduct Vulnerability Scans
  • Summary
Lesson 8: Implementing Penetration Testing to Evaluate Security
  • Topic A: Conduct Penetration Tests on Network Assets
  • Topic B: Follow Up on Penetration Testing
  • Summary
Lesson 9: Collecting Cybersecurity Intelligence
  • Topic A: Deploy a Security Intelligence Collection and Analysis Platform
  • Topic B: Collect Data from Network-Based Intelligence Sources
  • Topic C: Collect Data from Host-Based Intelligence Sources
  • Summary
Lesson 10: Analyzing Log Data
  • Topic A: Use Common Tools to Analyze Logs
  • Topic B: Use SIEM Tools for Analysis
  • Summary
Lesson 11: Performing Active Asset and Network Analysis
  • Topic A: Analyze Incidents with Windows-Based Tools
  • Topic B: Analyze Incidents with Linux-Based Tools
  • Topic C: Analyze Malware
  • Topic D: Analyze Indicators of Compromise
  • Summary
Lesson 12: Responding to Cybersecurity Incidents
  • Topic A: Deploy an Incident Handling and Response Architecture
  • Topic B: Contain and Mitigate Incidents
  • Topic C: Prepare for Forensic Investigation as a CSIRT
  • Summary
Lesson 13: Investigating Cybersecurity Incidents
  • Topic A: Apply a Forensic Investigation Plan
  • Topic B: Securely Collect and Analyze Electronic Evidence
  • Topic C: Follow Up on the Results of an Investigation
  • Summary
Appendix A: Mapping CyberSec First Responder (Exam CFR-310) Objectives to Course Content
Appendix B: Regular Expressions
  • Topic A: Parse Log Files with Regular Expressions
Appendix C: Security Resources
  • Topic A: List of Security Resources
Appendix D: U.S. Department of Defense Operational Security Practices
  • Topic A: Summary of U.S. Department of Defense Operational Security Practices

Hands on Activities (Live Labs)

Analyzing Reconnaissance Threats to Computing and Network Environments

  • Exploiting a Website Using SQL Injection
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Information about the Current Connection Statistics of TCP
  • Finding the MAC Address of a System
  • Getting Information about UDP Ports
  • Getting Information about TCP Ports
  • Using the tracert Command
  • Scanning the Local Network
  • Displaying Metadata Information
  • Getting UDP Settings
  • Getting TCP Settings
  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning Using Nessus

Analyzing Attacks on Computing and Network Environments

  • Analyzing Traffic Captured from Site Survey Software (kismet)
  • Capturing Packets Using Wireshark
  • Using TCPdump
  • Using NetWitness Investigator
  • Using a Numeric IP Address to Locate a Web Server
  • Using OWASP ZAP
  • Exploiting LDAP-Based Authentication
  • Performing a Memory-Based Attack
  • Performing Session Hijacking Using Burp Suite
  • Confirming the Spoofing Attack in Wireshark
  • Using the hping Program
  • Getting Information about DNS

Analyzing Post-Attack Techniques

  • Enabling the peek performance option
  • Using Global Regular Expressions Print (grep)
  • Using the dd Utility
  • Using the Event Viewer

Managing Vulnerabilities in the Organization

  • Obtaining IP Route Information from the IP Routing Table
  • Using MBSA

Collecting Cybersecurity Intelligence

  • Obtaining Information about the Net Firewall Profile
  • Obtaining Information about Different IP versions
  • Obtaining the IP version supported by a network adapter

Analyzing Log Data

  • Analyzing Linux Logs for Security Intelligence

Performing Active Asset and Network Analysis

  • Exploring Windows File Registry
  • Using FTK Imager
  • Using the Disk Defragmenter Microsoft Drive Optimizer
  • Using a Hex Editor

Investigating Cybersecurity Incidents

  • Converting the FAT32 Partition to NTFS Using cmd
  • Converting an NTFS Partition to FAT32 Using Disk Management
  • Converting a FAT32 Partition to NTFS Using Disk Management
Exam FAQs
What are the prerequisites for this exam?

Here are the prerequisite of the CFR-310 exam:

  • At least two years (recommended) of experience or education in computer network security technology, or a related field.
  • The ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
  • General knowledge of the concepts and operational framework of common assurance
  • safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level skills with some of the common operating systems for computing environments. Entry-level understanding of some of the common concepts for network environments, such as routing and switching.
  • General or practical knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP. 
What is the exam registration fee? USD 771.75
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple Choice/Multiple Response
How many questions are asked in the exam? The exam contains 100 questions.
What is the duration of the exam? 120 minutes
What is the passing score? 70% or 71%, depending on exam form
What is the exam's retake policy? Any candidates who do not pass a CertNexus certification exam on the first attempt are eligible for one free retake after 30 calendar days from the time they took the initial exam. All CertNexus certification exam vouchers include one free retake. Candidates must purchase another voucher for any subsequent attempts beyond the first free retake.
What is the validity of the certification? TBD (Typically 3 years from Launch Date)
Where can I find more information about this exam? Know more about the CFR-310
What are the career opportunities after passing this exam?
  • Incident Analyst
  • Incident Responder
  • Network Security Engineer
  • Network Defense Technician
  • Information Assurance Analyst
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept