Introduction to Cybersecurity Risks & Threats
- Introduction to Cybersecurity First Responder course: Overview and objectives
- Defining cybersecurity and its related key terms and terminologies
- Discussing the fundamentals and importance of risk management for Cybersecurity
- Tools and techniques for identifying, assessing and mitigating risks
- Understanding the role of documentation in risk management
- Exploring types of cyber threats, and their motivations, and develop their profiles
Threats & Attacks Analysis
- Understanding the analysis of trends affecting security posture
- Techniques for conducting continuous threat research
- Developing and Implementing threat models to predict potential threats
- Methods for performing reconnaissance in computing and network environment
- Techniques for assessing the impact of social engineering tactics on organization
- Exploring attacks and assessing their impact on computing and network environments:
- A system hacking attacks
- Web-based attacks
- Malware
- Hijacking and impersonation attacks
- Dos Incidents
- Discussing common mobile and cloud security threats and their impacts
Post-Attack, Vulnerabilities & Penetration Testing
- Techniques for assessing and analyzing post-attack:
- Command and control techniques
- Persistence techniques
- Lateral movement and pivoting techniques
- Data exfiltration techniques
- Anti-forensics techniques
- Techniques for assessing and analyzing post-attack:
- Developing and implementing a vulnerability management plan
- Explore common vulnerabilities and their impact in the organization
- Tools and techniques for scanning vulnerabilities
- Steps for conducting penetration tests on network assets
Cybersecurity Intelligence & Log Data
- Understanding the meaning of Cybersecurity intelligence
- Discussing the importance of collecting Cybersecurity intelligence in detecting threats
- Exploring the deployment of a security intelligence collection and analysis platform
- Methods for collecting data from intelligence sources:
- Discovering tools to analyze log data, including SIEM
Incidents Analysis, Response & Investigation
- Discussing how to analyze active asset and network
- Exploring Windows-Based and Linux-Based tools to analyze incidents
- Understanding the analysis of compromise indicators
- Developing a response and management plan for incident
- Strategies for containing and mitigating incidents
- Discussing steps for preparing forensic investigations and the role of CSIRT
- Developing a forensic investigation plan using incident information
- Understanding the importance of security while collecting and analyzing electronic evidence
- Exploring post-investigation activities
- Course evaluation and feedback