CertNexus CyberSec First Responder

This learning path is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-310) certification examination. It provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

13 courses  //   44 videos  //   9 hours of training

Prepare for the CertNexus CyberSec First Responder Exam

This learning path covers network defense and incident response methods, tactics, and procedures in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The path introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur.

Ready to take the CertNexus Cyber First Responder® CFR-310 exam? Save 10% by using code VXH93HF4A when purchasing their CertNexus exam voucher here. After purchasing the exam voucher, you will receive an email with info regarding how to register for and schedule your exam at a Pearson VUE testing center or virtual proctoring platform, OnVUE. No worries if you need more than a single attempt to obtain your CFR-310 certification as each voucher comes with a complimentary retake. Want to learn more about the CFR-310 exam, then check out the exam blueprint here.

Learning path components

CertNexus CyberSec First Responder Practice Exam
Practice Exam
CertNexus CyberSec First Responder Practice Exam

CertNexus CyberSec First Responder Practice Exam

Prepare for your CertNexus CyberSec First Responder exam and test your domain knowledge.

Number of questions: 41

CyberSec First Responder Introduction
Course
CyberSec First Responder Introduction

CyberSec First Responder Introduction

This course provides a brief overview of CertNexus CyberSec First Responder certification objectives.

1 video
4 minutes of training

Assessing Information Security Risk
Course
Assessing Information Security Risk

Assessing Information Security Risk

This course teaches how to Identify the strategic value of risk management in the context of information assurance, assess risks that affect the organization, translate risk assessment into specific strategies for mitigation, and integrate documentation into risk management.

4 videos
105 minutes of training

Analyzing the Threat Landscape
Course
Analyzing the Threat Landscape

Analyzing the Threat Landscape

This course teaches how to compare, contrast, and categorize cybersecurity threats and threat profiles and perform ongoing threat landscape research to prepare for incidents.

2 videos
34 minutes of training

Analyzing Reconnaissance Threats to Computing and Network Environments
Course
Analyzing Reconnaissance Threats to Computing and Network Environments

Analyzing Reconnaissance Threats to Computing and Network Environments

This course teaches how to implement threat modeling tools and tactics and assess the impacts of reconnaissance and social engineering.

3 videos
34 minutes of training

Analyzing Attacks on Computing and Network Environments
Course
Analyzing Attacks on Computing and Network Environments

Analyzing Attacks on Computing and Network Environments

This course teaches how to assess the impact of various attacks, including system hacking attacks, threats to web apps and services, malware, hijacking and impersonation attacks, denial of service incidents, and threats to mobile and cloud infrastructures.

7 videos
68 minutes of training

Analyzing Post-Attack Techniques
Course
Analyzing Post-Attack Techniques

Analyzing Post-Attack Techniques

This lesson teaches how to assess various post-attack techniques, including command and control, persistence, lateral movement and pivoting, data exfiltration, and anti-forensics techniques.

5 videos
46 minutes of training

Managing Vulnerabilities in the Organization
Course
Managing Vulnerabilities in the Organization

Managing Vulnerabilities in the Organization

This course teaches how to implement a vulnerability management plan, assess common vulnerabilities in the organization, and conduct vulnerability scans.

3 videos
30 minutes of training

Implementing Penetration Testing to Evaluate Security
Course
Implementing Penetration Testing to Evaluate Security

Implementing Penetration Testing to Evaluate Security

This course teaches how to conduct authorized penetration tests to evaluate the organization's security posture and analyze and report the results of a penetration test and make mitigation recommendations.

2 videos
25 minutes of training

Collecting Cybersecurity Intelligence
Course
Collecting Cybersecurity Intelligence

Collecting Cybersecurity Intelligence

This course teaches how to design and implement a system of cybersecurity intelligence collection and analysis and collect data from network-based and host-based intelligence sources.

3 videos
44 minutes of training

Analyzing Log Data
Course
Analyzing Log Data

Analyzing Log Data

This course teaches how to analyze a wide array of log data by using common Windows- and Linux-based security tools and incorporate a SIEM system into the analysis process.

3 videos
31 minutes of training

Performing Active Asset and Network Analysis
Course
Performing Active Asset and Network Analysis

Performing Active Asset and Network Analysis

This course teaches how to analyze incidents with Windows and Linux-based tools, use methods and tools for malware analysis, and analyze common indicators of potential compromise.

4 videos
54 minutes of training

Responding to Cybersecurity Incidents
Course
Responding to Cybersecurity Incidents

Responding to Cybersecurity Incidents

This course teaches how to design and implement a system to respond to urgent situations by mitigating immediate and potential threats, contain and mitigate incidents using various methods and devices, and prepare to move from the incident response phase to the post-mortem forensic investigation phase.

3 videos
47 minutes of training

Investigating Cybersecurity Incidents
Course
Investigating Cybersecurity Incidents

Investigating Cybersecurity Incidents

This course teaches how to create a plan for performing forensic investigations after incidents occur, collect and analyze electronic evidence in a secure manner to prevent tampering or compromise, and implement measures to follow up on an investigation.

4 videos
26 minutes of training

 

What you’ll learn

  • Network models and protocols
  • Best practices for network security
  • Common network security tools

Who is this for?

  • Network technicians
  • Network administrators or engineers
  • Anyone wanting to build their networking security skills

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec