Booking options
£25
£25
On-Demand course
4 weeks
All levels
The CyberSec First Responder: Threat Detection and Response (Exam CFR-210) is organized into 12 modules and includes everything you need to become successful in this profession.
To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 12 hours!
If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email.
Earn an e-certificate upon successful completion.
Accessible, informative modules taught by expert instructors
Study in your own time, at your own pace, through your computer tablet or mobile device
Benefit from instant feedback through mock exams and multiple-choice assessments
Get 24/7 help or advice from our email and live chat teams
Full Tutor Support on Weekdays
The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.
You are taught through a combination of
Video lessons
Online study materials
Mock exams
Multiple-choice assessment
Endorsed Certificate of Achievement from the Quality Licence Scheme
Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £119.00. Please note that overseas students may be charged an additional £10 for postage.
CPD Certificate of Achievement from Janets
Upon successful completion of the course, you will be able to obtain your course completion e-certificate. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99.
This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website.
To successfully complete the course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the course. After successfully passing the exam, you will be able to apply for Quality Licence Scheme endorsed certificate of achievement.
To verify your enhanced skills in the subject, we recommend that you also complete the assignment questions. These can be completed at any time which is convenient for yourself and will be assessed by our in-house specialised tutors. Full feedback will then be given on your current performance, along with any further advice or support.
Overview of Wireless Communications | |||
Identify the Importance of Risk Management | 00:11:00 | ||
Assess Risk | 00:13:00 | ||
Mitigate Risk | 00:22:00 | ||
Integrate Documentation into Risk Management | 00:14:00 | ||
Analyzing the Threat Landscape | |||
Classify Threats and Threat Profiles | 00:07:00 | ||
Perform Ongoing Threat Research | 00:12:00 | ||
Resources that Aid in Research of Threats | 00:03:00 | ||
Analyzing Recon Threats to Computing and Network Environments | |||
Implement Threat Modeling | 00:09:00 | ||
Assess the Impact of Reconnaissance Incidents | 00:10:00 | ||
Performing Reconnaissance on a Network | 00:07:00 | ||
Examining Reconnaissance Incidents | 00:08:00 | ||
Assess the Impact of Social Engineering | 00:10:00 | ||
Assessing the impact of Social Engineering | 00:07:00 | ||
Assessing the Impact of Phishing | 00:03:00 | ||
Analyzing Attacks on Computing and Network Environments | |||
Assess the Impact of System Hacking Attacks | 00:10:00 | ||
Cracking Passwords Using a Password File | 00:08:00 | ||
Assess the Impact of Web Based Attacks | 00:11:00 | ||
Assessing the Impact of Web-Based Threats | 00:03:00 | ||
Assess the Impact of Malware | 00:08:00 | ||
Malware Detection and Removal | 00:05:00 | ||
Assess the Impact of Hijacking and Impersonation Attacks | 00:13:00 | ||
Assess the Impact of DoS Incidents | 00:09:00 | ||
Assessing the Impact of DoS Attacks | 00:04:00 | ||
Assess the Impact of Threats to Mobile Security | 00:08:00 | ||
Assess the Impact of Threats to Cloud Security | 00:10:00 | ||
Analyzing Post-Attack Techniques | |||
Assess Command and Control Techniques | 00:08:00 | ||
Assessing Command and Control Techniques | 00:10:00 | ||
Assess Persistence Techniques | 00:05:00 | ||
Detecting Rootkits | 00:03:00 | ||
Assess Lateral Movement and Pivoting Techniques | 00:13:00 | ||
Assess Data Exfiltration Techniques | 00:04:00 | ||
Steganography | 00:03:00 | ||
Assess Anti Forensics Techniques | 00:09:00 | ||
Assessing Anti-Forensics | 00:03:00 | ||
Evaluating the Organization's Security Posture | |||
Conduct Vulnerability Assessments | 00:16:00 | ||
Perform a Vulnerability Scan with Nessus | 00:07:00 | ||
Perform a Vulnerability Scan with MBSA | 00:05:00 | ||
Conduct Penetration Tests on Network Assets | 00:18:00 | ||
Follow Up on Penetration Testing | 00:06:00 | ||
Collecting Cyber security Intelligence | |||
Deploy a Security Intelligence Collection and Analysis Platform | 00:19:00 | ||
Collect Data from Network Based Intelligence Sources | 00:15:00 | ||
Collecting Network-Based Security Intelligence | 00:07:00 | ||
Collect Data from Host Based Intelligence Sources | 00:13:00 | ||
Collecting Host-Based Security Intelligence | 00:15:00 | ||
Parsing Log files | 00:03:00 | ||
Analyzing Log Data | |||
Use Common Tools to Analyze Logs | 00:22:00 | ||
Analyzing Linux Logs for Security Intelligence | 00:08:00 | ||
Use SIEM Tools for Analysis | 00:07:00 | ||
Incorporating SIEMs into Security Intelligence Analysis | 00:18:00 | ||
Parse Log Files with Regular Expressions | 00:25:00 | ||
Performing Active Asset and Network Analysis | |||
Analyze Incidents with Windows-Based Tools | 00:17:00 | ||
Windows-Based Incident Analysis Tools | 00:19:00 | ||
Analyze Incidents with Linux Based Tools | 00:05:00 | ||
Linux-Based Incident Analysis Tools | 00:07:00 | ||
Analyze Malware | 00:11:00 | ||
Analyzing Malware | 00:03:00 | ||
Analyze Indicators of Compromise | 00:20:00 | ||
Analyzing Indicators of Compromise | 00:15:00 | ||
Responding to Cyber security Incidents | |||
Deploy an Incident Handling and Response Architecture | 00:22:00 | ||
Mitigate Incidents | 00:16:00 | ||
Hardening Windows Servers | 00:14:00 | ||
DNS Filtering | 00:05:00 | ||
Blacklisting and Whitelisting | 00:09:00 | ||
Prepare for Forensic Investigation as a CSIRT | 00:03:00 | ||
Investigating Cyber security Incidents | |||
Apply a Forensic Investigation Plan | 00:10:00 | ||
Securely Collect and Analyze Electronic Evidence | 00:08:00 | ||
Securely Collecting Electronic Evidence | 00:05:00 | ||
Analyzing Forensic Evidence | 00:07:00 | ||
Follow Up on the Results of an Investigation | 00:04:00 | ||
Mock Exam | |||
Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training | 00:20:00 | ||
Final Exam | |||
Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training | 00:20:00 | ||
Assignment | |||
Assignment - CyberSec First Responder: Threat Detection and Response (Exam CFR-210) | 3 weeks, 3 days | ||
Order Your Certificate | |||
Order your Certificate QLS | 00:00:00 |
Are there any prerequisites for taking the course?
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
Can I access the course at any time, or is there a set schedule?
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
How long will I have access to the course?
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Is there a certificate of completion provided after completing the course?
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
Can I switch courses or get a refund if I'm not satisfied with the course?
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
How do I track my progress in the course?
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
What if I have technical issues or difficulties with the course?
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.