Articles
CyberSec First Responder Course Agenda
Click Here To Register
Lesson 1: Assessing Information Security Risk
- Topic A: Identify the Importance of Risk Management
- Topic B: Assess Risk
- Topic C: Mitigate Risk
- Topic D: Integrate Documentation into Risk Management
Lesson 2: Creating an Information Assurance Lifecycle Process
- Topic A: Evaluate Information Assurance Lifecycle Models
- Topic B: Align Information Security Operations to the Information Assurance Lifecycle
- Topic C: Align Information Assurance and Compliance Regulations
Lesson 3: Analyzing Threats to Computing and Network Environments
- Topic A: Identify Threat Analysis Models
- Topic B: Assess the Impact of Reconnaissance Incidents
- Topic C: Assess the Impact of Systems Hacking Attacks
- Topic D: Assess the Impact of Malware
- Topic E: Assess the Impact of Hijacking and Impersonation Attacks
- Topic F: Assess the Impact of Denial of Service Incidents
- Topic G: Assess the Impact of Threats to Mobile Infrastructure
- Topic H: Assess the Impact of Threats to Cloud Infrastructures
Lesson 4: Designing Secure Computing and Network Environments
- Topic A: Information Security Architecture Design Principles
- Topic B: Design Access Control Mechanisms
- Topic C: Design Cryptographic Security Controls
- Topic D: Design Application Security
- Topic E: Design Computing Systems Security
- Topic F: Design Network Security
Lesson 5: Operating Secure Computing and Network Environments
- Topic A: Implement Change Management in Security Operations
- Topic B: Implement Monitoring in Security Operations
- Topic C: Test and Evaluate Information Assurance Architectures
Lesson 6: Assessing the Security Posture Within a Risk Management Framework
- Topic A: Deploy a Vulnerability Assessment and Management Platform
- Topic B: Conduct Vulnerability Assessments
- Topic C: Conduct Penetration Tests on Network Assets
- Topic D: Analyze and Report Penetration Results
Lesson 7: Collecting Cybersecurity Intelligence Information
- Topic A: Deploy a Security Intelligence Collection and Analysis Platform
- Topic B: Collect Data from Security Intelligence Sources
- Topic C: Establish Baselines and Make Sense of Collected Data
Lesson 8: Analyzing Cybersecurity Intelligence Information
- Topic A: Analyze Security Intelligence to Address Incidents
- Topic B: Incorporate Security Intelligence and Event Management
Lesson 9: Responding to Cybersecurity Incidents
- Topic A: Deploy an Incident Handling and Response Architecture
- Topic B: Perform Real-Time Incident Handling Tasks
- Topic C: Prepare for Forensic Investigation
Lesson 10: Investigating Cybersecurity Incidents
- Topic A: Create a Forensics Investigation Plan
- Topic B: Securely Collect Electronic Evidence
- Topic C: Identify Who, Why, and How of an Incident
- Topic D:Follow upon the Results of an Investigation
Lesson 11: Auditing Secure Computing and Network Environments
- Topic A: Deploy a Systems and Processes Auditing Architecture
- Topic B: Maintain a Deployable Audit Toolkit
- Topic C: Perform Audits Geared Toward the Information Assurance Lifecycle
Click Here To Register
Return to Course Description