CyberSec First Responder – Threat Detection and Response (CFRTDR) – Perfil
            
            
    
            
            
                
                                    
                                                
                            Esquema Detallado del Curso
                        
                        1 - Assessing Information Security Risk
- Topic A: Identify the Importance of Risk Management
 - Topic B: Assess Risk
 - Topic C: Mitigate Risk
 - Topic D: Integrate Documentation into Risk Management
 
2 - Analyzing the Threat Landscape
- Topic A: Classify Threats and Threat Profiles
 - Topic B: Perform Ongoing Threat Research
 
3 - Analyzing Reconnaissance Threats to Computing and Network Environments
- Topic A: Implement Threat Modeling
 - Topic B: Assess the Impact of Reconnaissance
 - Topic C: Assess the Impact of Social Engineering
 
4 - Analyzing Attacks on Computing and Network Environments
- Topic A: Assess the Impact of System Hacking Attacks
 - Topic B: Assess the Impact of Web-Based Attacks
 - Topic C: Assess the Impact of Malware
 - Topic D: Assess the Impact of Hijacking and Impersonation Attacks
 - Topic E: Assess the Impact of DoS Incidents
 - Topic F: Assess the Impact of Threats to Mobile Security
 - Topic G: Assess the Impact of Threats to Cloud Security
 
5 - Analyzing Post-Attack Techniques
- Topic A: Assess Command and Control Techniques
 - Topic B: Assess Persistence Techniques
 - Topic C: Assess Lateral Movement and Pivoting Techniques
 - Topic D: Assess Data Exfiltration Techniques
 - Topic E: Assess Anti-Forensics Techniques
 
6 - Managing Vulnerabilities in the Organization
- Topic A: Implement a Vulnerability Management Plan
 - Topic B: Assess Common Vulnerabilities
 - Topic C: Conduct Vulnerability Scans
 
7 - Implementing Penetration Testing to Evaluate Security
- Topic A: Conduct Penetration Tests on Network Assets
 - Topic B: Follow Up on Penetration Testing
 
8 - Collecting Cybersecurity Intelligence
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
 - Topic B: Collect Data from Network-Based Intelligence Sources
 - Topic C: Collect Data from Host-Based Intelligence Sources
 
9 - Analyzing Log Data
- Topic A: Use Common Tools to Analyze Logs
 - Topic B: Use SIEM Tools for Analysis
 
10 - Performing Active Asset and Network Analysis
- Topic A: Analyze Incidents with Windows-Based Tools
 - Topic B: Analyze Incidents with Linux-Based Tools
 - Topic C: Analyze Malware
 - Topic D: Analyze Indicators of Compromise
 
11 - Responding to Cybersecurity Incidents
- Topic A: Deploy an Incident Handling and Response Architecture
 - Topic B: Contain and Mitigate Incidents
 - Topic C: Prepare for Forensic Investigation as a CSIRT
 
12 - Investigating Cybersecurity Incidents
- Topic A: Apply a Forensic Investigation Plan
 - Topic B: Securely Collect and Analyze Electronic Evidence
 - Topic C: Follow Up on the Results of an Investigation
 
13 - Appendix A: Mapping Course Content to CyberSec First Responder™ (Exam CFR-310)
14 - Appendix B: Regular Expressions
15 - Appendix C: Security Resources
16 - Appendix D: U.S. Department of Defense Operational Security Practices