16 — 20 Set 2019
Laboral — 09:30h/17:30h
30 horas — 5 dias
CFR takes a holistic approach to preparing employees to analyze threats, secure networks, handle incidents, and utilize other critical security skills to protect your organization with a single course. Designed for information assurance professionals whose job functions include development, operations, management, and enforcement of secure systems and networks.
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.
This course is designed for cybersecurity practitioners who perform job functions related to protecting and defending information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the restoration of those information systems in a cybersecurity context including protection, detection, investigation, reaction, response, and auditing capabilities.
This course is also designed to assist students in preparing for the CyberSec First Responder: Threat Detection and Response (Exam CFR-101) certification examination. What you learn and practice in this course can be a significant part of your preparation.
In this course, you will develop, operate, manage, and enforce security capabilities for systems and networks. You will:
To ensure your success in this course you should have the following requirements:
You can obtain this level of skills and knowledge by taking the following courses or by passing the relevant exams:
2. Creating an Information Assurance Lifecycle Process
3. Analyzing Threats to Computing and Network Environments
4. Designing Secure Computing and Network Environments
5. Operating Secure Computing and Network Environments
6. Assessing the Security Posture Within a Risk Management Framework
7. Collecting Cybersecurity Intelligence Information
8. Analyzing Cybersecurity Intelligence Information
9. Responding to Cybersecurity Incidents
10. Investigating Cybersecurity Incidents
11. Auditing Secure Computing and Network Environments
Your message was successful sent.