You need to sign in or sign up before continuing.

Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps [CBRFIR-CPLL]

Location type

Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps [CBRFIR-CPLL]

Global Knowledge Network Netherlands B.V.
Logo Global Knowledge Network Netherlands B.V.
Provider rating: starstarstarstar_halfstar_border 7.5 Global Knowledge Network Netherlands B.V. has an average rating of 7.5 (out of 189 reviews)

Tip: need more info about the programme or price? Request information for free!

Description

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) course helps build your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills. The course prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents.

Gain an understanding of digital forensics, including the collection and examination of digital evidence on electronic devices. Learn how to build the subsequent response to threats and attacks and how to proactively conduct audits to prevent future attacks.

This course will help you:

  • Develop an understanding of various cybersecurity threat and vulnerabilities
  • Establis…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) course helps build your Digital Forensics and Incident Response (DFIR) and cybersecurity knowledge and skills. The course prepares you to identify and respond to cybersecurity threats, vulnerabilities, and incidents.

Gain an understanding of digital forensics, including the collection and examination of digital evidence on electronic devices. Learn how to build the subsequent response to threats and attacks and how to proactively conduct audits to prevent future attacks.

This course will help you:

  • Develop an understanding of various cybersecurity threat and vulnerabilities
  • Establish a framework for proactively responding to cybersecurity threat and vulnerabilities
  • Prepare for the 300-215 CBRFIR Professional Level exam.

OBJECTIVES

After completing this course, you should be able to:

  • Analyze the components needed for a root cause analysis report
  • Apply tools such as YARA for malware identification
  • Recognize the methods identified in the MITRE attack framework
  • Leverage scripting to parse and search logs or multiple data sources such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid
  • Recommend actions based on post-incident analysis
  • Determine data to correlate based on incident type (host-based and network-based activities)
  • Evaluate alerts from sources such as firewalls, intrusion prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to respond to cyber incidents and recommend mitigation
  • Evaluate elements required in an incident response playbook and the relevant components from the ThreatGrid report
  • Analyze threat intelligence provided in different formats (such as, STIX and TAXII)

CONTENT

Introducing Incident Response and Forensic Analysis

Describing Digital Forensics and Incident Response (DFIR) Guidelines and Associations

Examining Threats and Vulnerability Frameworks

Describing the Analytical Mindset

Preparing for Incident Response and Responding to Threats

Identifying Sources of Evidence

Gathering Intelligence

Examining Digital Forensics and Incident Response Tools

Describing Detection and Analysis

Describing Investigation and Detection

Describing Digital Forensics

Describing Breach Containment and Eradication

Describing Post-Incident Activities

Demo Videos

  • Explore Adversarial Techniques, Tactics, and Common Knowledge (ATT&CK), Common Attack Pattern Enumeration and Classification (CAPEC), and National Institute of Standards and Technology (NIST) Common Weakness Enumeration Specification (CWE), and Common Vulnerabilities and Exposures (CVE) Frameworks
  • Explore Available Incident-Related Information
  • Examine Network Diagrams
  • Examine Logs
  • Examine Response Data Formats
  • Discover Sources of Evidence in the Network
  • Discover Sources of Evidence at Endpoints
  • Discover Sources of Evidence in the Cloud
  • Discover Syslog Facilities and Severity Levels
  • Explore Gathered Intelligence
  • Explore AccessData Forensic Toolkit (FTK) and Autopsy
  • Explore Hex Encoding
  • Explore Disassemblers and Debuggers
  • Explore Deobfuscation Tools
  • Explore Native Windows Tools Used in Digital Forensics and Incident Response
  • Explore Native Linux Tools
  • Explore Wireshark
  • Create and Use a Yet Another Recursive Acronym (YARA) Rule
  • Examine the Threat-Hunting Process
  • Perform Data Acquisition
  • Acquire Data from the Cloud
  • Acquire Data Acquisition from Files, Disk, and Drive
  • Analyze RAM and Fileless Malware Data
  • Analyze Network Data
  • Correlate Data from Different Sources
  • Use Scripting for Forensics
  • Analyze Web Application Logs
  • Contain the Attack
  • Remediate an Incident
  • Analyze the Evidence and Propose the Solution
Stay up-to-date on new reviews
There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate € 1,- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.